Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

3rd Party Services

Below you will find reports with the tag of “3rd Party Services”

image from Security Response: The Apple Threat Landscape

Security Response: The Apple Threat Landscape

This report examines the weaknesses in Apple products and the growing trend of attacks on the Apple system.

Added: October 16, 2018
image from The Cost of Malware Containment

The Cost of Malware Containment

Ponemon Institute conducted this research to understand how much money organizations are wasting in their efforts to prevent malware driven threats and other malicious programs from stealing high value and confidential data. To ensure a knowledgeable participant, we surveyed 630 IT and IT security practitioners in the United States who are familiar with their organization’s practices for containing malware infections. They also have responsibility in detecting, evaluating and/or containing malware infections within their organization.

(more available)
Added: October 16, 2018
image from UK 2015 Cyber Risk Survey Report

UK 2015 Cyber Risk Survey Report

This is an in-depth study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. The benchmarking data in this report was collected from risk professionals and CFOs from large and medium-sized corporations from across the UK. It is the hope that the aggregated information will provide useful benchmarking data and reference points against which the reader can compare their own company’s positions.

(more available)
Added: October 16, 2018
image from 2015 Strategic Security Survey

2015 Strategic Security Survey

In this report, they: a) Discuss the assumptions shaping IT defense spending plans b) Delve into the real and intangible costs of a data breach c) Examine why malware is still the most common form of breach. d) Look at which threats on which security teams need to focus.

(more available)
Added: October 15, 2018
image from 2017 Global IP Reputation Analysis Report

2017 Global IP Reputation Analysis Report

This report provides a monthly snapshot of analysis and trends of IP Reputation globally.

Added: October 15, 2018
image from 2017 Quarterly Threat Report Q1

2017 Quarterly Threat Report Q1

This report takes a look at the cyber threats that took place in the 1st Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 15, 2018
image from 3 Reasons Your IAM Is Leaking Revenue

3 Reasons Your IAM Is Leaking Revenue

Because Identity Management has different use cases depending on whether you’re using it for consumers, other busi- nesses or your own employees, this paper will outline how adopting an optimized identity management system can help realize revenue.

(more available)
Added: October 15, 2018
image from Achieving A Competitive Advantage Through Application Security

Achieving A Competitive Advantage Through Application Security

This paper provides 5 key takeaways from a survey of IT professionals and executives who make software purchasing decisions for their organization.

(more available)
Added: October 15, 2018
image from Annual Worldwide Infrastructure Security Report, Vol 11

Annual Worldwide Infrastructure Security Report, Vol 11

The data within this document is based on the collective experiences, observations and concerns of the global operational security community. Arbor Networks has collected this data through a survey conducted in October 2015.

(more available)
Added: October 15, 2018
image from Automation: The Future Of Network Visibility

Automation: The Future Of Network Visibility

This whitepaper provides some insights to consider for automating your SIEM, NMS, packet capture device, and other tool deployments.

Added: October 15, 2018
image from Cloud Best Practices:Audit Checklist For Endpoint Security

Cloud Best Practices:Audit Checklist For Endpoint Security

This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.

(more available)
Added: October 15, 2018
image from Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime

As required by General Assembly resolution 65/230, this Study has been prepared with a view to ‘examining options to strengthen existing and to propose new national and international legal or other responses to cybercrime.’ The mandate comes within the context of a number of other mandates and activities related to cybercrime and cybersecurity within the United Nations system. In this respect, the focus of the Study is limited to the crime prevention and criminal justice aspects of preventing and combating cybercrime.

(more available)
Added: October 15, 2018
image from DDoS Threat Report Q1 2016

DDoS Threat Report Q1 2016

This report takes a look at the DDoS threats that occurred in the first quarter of 2016.

Added: October 15, 2018
image from GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 15, 2018
image from Gemalto Expands Service Based Security Platform With SafeNet Data Protection On Demand

Gemalto Expands Service Based Security Platform With SafeNet Data Protection On Demand

This report offers a good look at Gemalto’s new service based security platform.

Added: October 15, 2018
image from Simplifying Mobile App Integration With SDKs

Simplifying Mobile App Integration With SDKs

If you’re looking for a paper that talks about Mobile App Integration, this paper is for you.

Added: October 15, 2018
image from The Rise And Fall OF Scan4You

The Rise And Fall OF Scan4You

This is exclusive research into the cyber threat that is Scan4You. It discusses the history and current outcomes of this unique threat.

(more available)
Added: October 15, 2018
image from 2016 State of the Endpoint Report

2016 State of the Endpoint Report

This annual study is conducted by Ponemon Institute to understand trends and changes in endpoint risk in organizations. An endpoint can include servers, desktops, laptops, smartphones, and even printers, ATMs and PoS devices. They surveyed 694 US IT and IT security practitioners who are involved in endpoint security in a variety of organizations.

(more available)
Added: October 14, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. They then outline best practices for cost-effectively mitigating risk and euring quality in life-critical deployment scenarios.

(more available)
Added: October 14, 2018
image from Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

This whitepaper discusses the disconnects that have emerged between cybersecurity threats and organizations’ contermeasures.

Added: October 14, 2018
image from Protecting The Crown Jewels In The Pivot To Digital Transformation

Protecting The Crown Jewels In The Pivot To Digital Transformation

This white paper by Onapsis and HMG Strategy will explore best practices for securing vital information contained in SAP and Oracle systems for those organizations that are shifting to a digital environment. In the pages that follow, discover the top security risks associated with mission-critical systems along with recommended approaches for mitigating those risks.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 16
  • 17
  • 18
  • 19
  • 20
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 16:08 UTC (build b1d7be4)