Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

3rd Party Services

Below you will find reports with the tag of “3rd Party Services”

image from Security Analytics And Operations In Transition

Security Analytics And Operations In Transition

This report seeks to offer insight into the cybersecurity world and to analyze the dangers and pitfalls of the transition in the profession.

(more available)
Added: October 23, 2018
image from Security Practices Guide For SOC 2 Compliance

Security Practices Guide For SOC 2 Compliance

This is a short guide for helping organizations become SOC 2 compliant.

Added: October 23, 2018
image from State Of The Channel Ransomware Report

State Of The Channel Ransomware Report

Datto surveyed 1,100 MSPs about ransomware and cybersecurity and published the key findings in this report. We aim to provide the Channel perspective on this growing epidemic and highlight the current prevalence of the malware, its behavior, its target, and its impact within the global small business community. In the end, we’ll provide best practices and solutions for businesses looking to ensure total data protection, business continuity and disaster recovery.

(more available)
Added: October 23, 2018
image from The Digital Business: Creating The Right IT Platform For Digital Transformation

The Digital Business: Creating The Right IT Platform For Digital Transformation

The purpose of this paper is to help CIOs and their boardroom colleagues find the right approach to building a digital infrastructure to achieve the right outcomes for their business.

(more available)
Added: October 23, 2018
image from 5G Security Architecture White Paper

5G Security Architecture White Paper

From the report, “We are now seeing the first incarnations of 5G technology. It provides many capabilities that make it a preferred platform for the digitalized world. Solid security is one of the strengths of 4G networks and the same is expected from 5G. This cannot, however, be achieved just by adapting 4G security features to 5G system because the 5G service palette is more than just an extension from that of 4G. Completely new security functionalities and services are needed in addition to enhanced versions of 4G security features.”

(more available)
Added: October 22, 2018
image from China Country Profile 2017

China Country Profile 2017

This paper gives a profile of China.

Added: October 22, 2018
image from Cyber Insurance Survey 2014

Cyber Insurance Survey 2014

This report is laid out as follows: Section I focuses on the current prevalence of cyber security insurance and the policy forms it takes. Section II discusses the current structure of the cyber security market. Section III investigates perceptions of the significance, risks, and challenges of cyber security insurance. Section IV details responding company demographics. Section V describes demographic characteristics of the respondents.

(more available)
Added: October 22, 2018
image from DDoS Threat Report Q4 2016

DDoS Threat Report Q4 2016

This report takes a look at the DDoS threats that occurred in the fourth quarter of 2016.

Added: October 22, 2018
image from GDPR An Action Plan For Cloud Readiness

GDPR An Action Plan For Cloud Readiness

This E-Book discusses ways to become GDPR Compliant.

Added: October 22, 2018
image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. Program research is supported by government agencies, foundations, and the private sector.

(more available)
Added: October 22, 2018
image from Practitioner’s Guide to Building a Security Operations Center (SOC)

Practitioner’s Guide to Building a Security Operations Center (SOC)

This white paper goes into detail about what is needed to build and maintain an SOC, the types of technologies and skillsets required, and advantages of an all-in-one security monitoring platform.

(more available)
Added: October 22, 2018
image from The Five Steps To Managing Third Party Risk

The Five Steps To Managing Third Party Risk

This white paper tackles the subject of how outsourced labor can cause cybersecurity risk.

Added: October 22, 2018
image from The State Of Industrial Cybersecurity 2018

The State Of Industrial Cybersecurity 2018

The present trend study “The State of Industrial Cybersecurity 2018” seeks to answer the questions, what do use companies really want? What Are their priorities, and what concerns and challenges do they face? What external and internal factors are impacting industrial cybersecurity? What strategies and measures are being employed, now and in the future?

(more available)
Added: October 22, 2018
image from Threat Monitoring Detection Response Report 2017

Threat Monitoring Detection Response Report 2017

This study is a summary of responses from over 400 cybersecurity professionals to provide a comprehensive snapshot on the evolving threat landscape, insider and external threats, preventative measures, threat monitoring and data collection, threat intelligence, threat detection, threat hunting, threat analytics, incident response, and incident recovery.

(more available)
Added: October 22, 2018
image from To The Point: Reporting Cybersecurity and IT Risk to the Board

To The Point: Reporting Cybersecurity and IT Risk to the Board

This report provides helpful insight into why board executives don’t understand Cybersecurity issues. It also adds helpful advice for how to convince the board of the importance of these issues.

(more available)
Added: October 22, 2018
image from Unlocking B2B SaaS Growth With Identity Management

Unlocking B2B SaaS Growth With Identity Management

SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.

(more available)
Added: October 22, 2018
image from Whitepaper: Legislation And The Impact On Data Privacy

Whitepaper: Legislation And The Impact On Data Privacy

From the paper, “In March 2017, the expectation of privacy while surfing the internet disappeared in the United States. Congress voted to eliminate the broadband privacy rules that required internet service providers (ISPs) to get explicit consent from consumers before selling or sharing web browsing data and other private information to third parties. With no rules in place to protect personal or corporate web browsing data, there are a few proactive steps to take to help safeguard this information.”

(more available)
Added: October 22, 2018
image from 2017 Cloud Security Report

2017 Cloud Security Report

This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others.

(more available)
Added: October 21, 2018
image from 5th Annual State of Application Security Report

5th Annual State of Application Security Report

Arxan’s 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality

Added: October 21, 2018
image from 6 Key Security Requirements for Next Generation Mobile Networks

6 Key Security Requirements for Next Generation Mobile Networks

Mobile network operators (MNOs) are evolving rapidly to deploy transformative networks—4G, 5G, SDN/NFV. Meanwhile they are battling a new and different cyber attack landscape that could compromise BOTH their networks AND their subscribers. Network and subscriber protection are no longer separate problems in this new digital age. Legacy security solutions are inadequate. A new approach to security is needed—with a focus on PREVENTION —not just a reaction to prior known threats. Adopting a prevention posture enables operators to get ahead of the evolving sophistication of attackers.

(more available)
Added: October 21, 2018
image from DDoS Threat Report Q3 2017

DDoS Threat Report Q3 2017

This report takes a look at the DDoS threats that occurred in the third quarter of 2017.

Added: October 21, 2018
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 00:08 UTC (build b1d7be4)