Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Application Security

Below you will find reports with the tag of “Application Security”

image from The Continuum Of Cloud Native Topologies

The Continuum Of Cloud Native Topologies

This report gives a clever way to understand Cloud security topologies. It breaks all of the concepts down into a simple continuum.

(more available)
Added: October 24, 2018
image from The State Of Application Survey 2018

The State Of Application Survey 2018

Before slowing down development and causing customers to revolt, security and risk pros should read this report to understand the current state of application security and how emerging techniques support the speed your business needs.

(more available)
Added: October 24, 2018
image from Threat Intelligence Executive Report 2018: Volume 1

Threat Intelligence Executive Report 2018: Volume 1

This Threat report details some early 2018 threats like cryoticurrency mining, hardware vulns, and government sponsored cyber threats.

Added: October 24, 2018
image from ZCash Ceremony And Audit

ZCash Ceremony And Audit

This report is based on a security audit of the opening ceremony of ZCash.

Added: October 24, 2018
image from Crossing The Last Mile Of IoT Security Cyber Risk

Crossing The Last Mile Of IoT Security Cyber Risk

This paper seeks to provide understanding and aid with meeting the unique information demands that the Internet of Things requires.

(more available)
Added: October 23, 2018
image from EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

This report uniquely addresses SecOps initiatives in terms of role, team leadership, success rates, company size, vertical adoptions, and geography. It provides telling insights into technology priorities, process, and best practices and metrics for critical use cases—including integrated security/ compliance for performance and availability management, change and configuration management, and IT asset management and audits. The report also addresses how cloud, agile, digital transformation, and mobile all impact SecOps directions.

(more available)
Added: October 23, 2018
image from Ironclad API's:An Approach For Application Security Testing

Ironclad API's:An Approach For Application Security Testing

This paper discusses some API’s and how you can protect them from an attack.

Added: October 23, 2018
image from United Endpoint Management: The Next Step In The Evolution Of Device Management

United Endpoint Management: The Next Step In The Evolution Of Device Management

This paper provides a simple summary of Endpoint Management and why it is necessary and helpful.

Added: October 23, 2018
image from Web Application Attack Statistics Q4 2017

Web Application Attack Statistics Q4 2017

This report provides statistics on attacks performed against web applications during the fourth quarter of 2017.

Added: October 23, 2018
image from 2018 Web Application Security Report

2018 Web Application Security Report

Radware sought the opinions of senior executives and IT professionals responsible for network security at companies with a global reach. What follows is a summary of current global perceptions on the state of application attacks and insights on how to best identify and mitigate threats in the future.

(more available)
Added: October 22, 2018
image from Connected Healthcare: The Cybersecurity Threat Is Real And Impending

Connected Healthcare: The Cybersecurity Threat Is Real And Impending

This report discusses why it is important to protect medical device apps “in the wild”.

Added: October 22, 2018
image from Getting The Board On Board With Application Security

Getting The Board On Board With Application Security

It is the intention of this paper to provide you the reader with the essential tools and language that you can use to educate your board members on the importance and necessity of Application Security.

(more available)
Added: October 22, 2018
image from 2017 Cloud Security Report

2017 Cloud Security Report

This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others.

(more available)
Added: October 21, 2018
image from 5th Annual State of Application Security Report

5th Annual State of Application Security Report

Arxan’s 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality

Added: October 21, 2018
image from Application Security Statistics Report 2017

Application Security Statistics Report 2017

This is the 12th annual WhiteHat Security Statistics Report. This year they’ve added some real metrics around DevSecOps. They’ve also added a new SAST section and a mobile security section.

(more available)
Added: October 21, 2018
image from Bring Mac To The Enterprise With A Modern Approach To Management

Bring Mac To The Enterprise With A Modern Approach To Management

This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.

(more available)
Added: October 21, 2018
image from Future Vision For Secure Mobility

Future Vision For Secure Mobility

From The Report, “This article is fifth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides a future vision for how mobile security is likely to evolve in the context of enterprise evolution.”

(more available)
Added: October 21, 2018
image from Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

The Stuxnet and Ukranian power grid attacks give us clear ideas about how much damage a determined adversary can inflict not only on the business or operation concerned, but also on the general public. This paper takes a look at critical infrastructure attacks.

(more available)
Added: October 21, 2018
image from Seven Decision Points When Considering Containers

Seven Decision Points When Considering Containers

The decision to deploy code to containers versus virtual machines or dedicated servers has some unique characteristics. Amalgam Insights has identified seven key decision points that should be considered when choosing to deploy to containers. These seven decision points can act as guideposts that will help point to or from using containers.

(more available)
Added: October 21, 2018
image from The Tao Of Mobile App DevSecOps: Building A Mobile App Sec Factory

The Tao Of Mobile App DevSecOps: Building A Mobile App Sec Factory

This report seeks to aid the reader in developing a better way to create apps and not compromise on security.

(more available)
Added: October 21, 2018
image from 5th Annual State of Application Security Report, Healthcare Edition (January 2016)

5th Annual State of Application Security Report, Healthcare Edition (January 2016)

This report deals with mobile healthcare apps and their ability to be easily hacked.

Added: October 20, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)