Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Application Security

Below you will find reports with the tag of “Application Security”

image from Bridging The Gap Between Secops Intent And Reality

Bridging The Gap Between Secops Intent And Reality

This report is based on a survey conducted from a variety of groups with regards to Secops and why are there is a gap between what it intends to do and the reality of what it is.

(more available)
Added: October 20, 2018
image from Internet Security Threat Report Volume 23

Internet Security Threat Report Volume 23

This paper explores threats like coin-mining attcks, spike in software supply-chain attacks, the ransomware business, the drop in zero days, and the rise in mobile malware.

(more available)
Added: October 20, 2018
image from Lack Of Visibility Drives Public Cloud Security Risk

Lack Of Visibility Drives Public Cloud Security Risk

Ixia recently commissioned Dimensional Research to conduct a survey of cloud users to understand their top concerns about managing cloud operations. This report provides details about their findings.

(more available)
Added: October 20, 2018
image from March 2018 AppSec Intelligence Report

March 2018 AppSec Intelligence Report

This monthly report details Application Security obvservations from March 2018.

Added: October 20, 2018
image from The 2018 Hacker Report

The 2018 Hacker Report

This report is a kind of dossier on the hacker community. It lets you in to their world, to know their mindset, and thoughts on the bug bounty community.

(more available)
Added: October 20, 2018
image from The Economics Of Defense Security

The Economics Of Defense Security

This is a useful article that takes a look at the financial numbers of paying for a defensive strategy vs. paying for a breach. Perfect for accountants, and those who need to understand data from a purely financial side.

(more available)
Added: October 20, 2018
image from Web Attack Survival Guide

Web Attack Survival Guide

This guide provides a playbook for helping a company prepare for and handle web attacks.

Added: October 20, 2018
image from Website Security Statistic Report

Website Security Statistic Report

From the report, “Rather than provide a lengthy analysis of the data in this Stats Report in this introduction, we’ve decided instead to provide some “what this means to you” commentary at the end of the three main sections of the report; commentary that attempts to make the data relevant to Executives, Security practitioners and DevOps professionals. Security is a concern that spans multiple teams in an organization – from the board and C-suite, to IT and development teams, to the security team and beyond – and the data in this report will mean different things to these different audiences.”

(more available)
Added: October 20, 2018
image from 4th Annual State of Application Security Report (2015 Mid-Year Report)

4th Annual State of Application Security Report (2015 Mid-Year Report)

Arxan and iThreat Cyber Group (ICG) analyzed data collected by ICG over the past 3.5 years that looked at the distribution of pirated software and digital assets on the Dark Web (i.e., the portion of content on the World Wide Web that is not indexed by standard search engines) and indexed sites that are focused on distributing pirated releases.

(more available)
Added: October 19, 2018
image from Internet Trends 2016 Code Conference

Internet Trends 2016 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 19, 2018
image from Mobile Banking: Big Business, Big Target, Big Opportunity

Mobile Banking: Big Business, Big Target, Big Opportunity

This report provides insights into the security issues surrounding Mobile Banking.

Added: October 19, 2018
image from Securing Health Data In A BYOD World

Securing Health Data In A BYOD World

Health Organizations are increasinly using BYOD to adminster care in their facilities. With this technological advancement comes major security concerns. This paper looks at those issues and discusses what can be done to protect Health Data.

(more available)
Added: October 19, 2018
image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from Mobile App Security Program Management Handbook

Mobile App Security Program Management Handbook

From the report, “While I call this document a ‘getting started guide,’ regardless of your program’s maturity I think you’ll find some helpful hints regarding the people, process, and technology that can elevate your mobile app security program to the next level.”

(more available)
Added: October 18, 2018
image from State of Software Security Volume 7

State of Software Security Volume 7

Veracode’s intention is to provide security practitioners with tangible AppSec benchmarks with which to measure their own programs against. They’ve sliced and diced the numbers to offer a range of perspectives on the risk of applications throughout the entire software lifecycle. This includes statistics on policy pass rates against security standards, the statistical mix of common vulnerability types found in applications, flaw density and average fix rate.

(more available)
Added: October 18, 2018
image from 2017 Security Awareness Report

2017 Security Awareness Report

During the research for this report, two key findings were discovered that uncovered why awareness programs thrive or fail.

Added: October 17, 2018
image from Authentication Survival Guide

Authentication Survival Guide

This book aims to be an accessible starting point for everyone that is starting to work with authentication. In this book, you’ll find a concise review of all the key protocols, formats, concepts and terminology that you’ll likely come across when implementing authentication.

(more available)
Added: October 17, 2018
image from Enterprise Guide To iOS App Development

Enterprise Guide To iOS App Development

This paper provides a helpful guide to iOS App development for the enterprise.

Added: October 17, 2018
image from State Of Enterprise Resource Planning In Cloud Security

State Of Enterprise Resource Planning In Cloud Security

The main objective of the document is to provide a brief introduction to cloud ERP security. The targeted audience of this document includes IT and management professionals who oversee the business IT assets of their respective organizations.

(more available)
Added: October 17, 2018
image from The Case For Software Security

The Case For Software Security

This E-book discusses the importance of securing software.

Added: October 17, 2018
image from The Road To Compliance:Steps For Securing Data To Comply With The GDPR

The Road To Compliance:Steps For Securing Data To Comply With The GDPR

Here is another helpful eBook to provide insight into the GDPR compliance situation.

Added: October 17, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)