Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

APT

Below you will find reports with the tag of “APT”

image from Virtualization's Hidden Traps

Virtualization's Hidden Traps

This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany.

(more available)
Added: October 22, 2018
image from Cybersecurity Survey

Cybersecurity Survey

Based on a 2015 survey of more than 100 major Canadian organizations across all major sectors, this paper sets out to prove that with additional focus, investment, and increased maturity, not all breaches need to be the size or have the impact that we have seen recently reported.

(more available)
Added: October 21, 2018
image from GTIC Monthly Threat Report November 2017

GTIC Monthly Threat Report November 2017

This monthly threat report takes a look at the month of November 2017. Specifically, it looks at IoT Attacks, Hidden Cobra, and the Fancy Bear exploit of a Microsoft VULN.

(more available)
Added: October 21, 2018
image from How Cyber Threat Intelligence Safegaurds Against Today's Threat Landscape

How Cyber Threat Intelligence Safegaurds Against Today's Threat Landscape

This paper takes a look at Cyber Threat Intelligence.

Added: October 21, 2018
image from How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape

How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape

This blog post discusses cyber crime as it relates to cryptocurrencies and how it is changing the landscape.

Added: October 21, 2018
image from AndroRATIntern: A Japanese Mobile Threat With Global Implications For Mobile Data Security

AndroRATIntern: A Japanese Mobile Threat With Global Implications For Mobile Data Security

This report provides an exclusive look at a very particular Trojan that has appeared out of Japan.

Added: October 20, 2018
image from Best Practices For Geolocation By IP

Best Practices For Geolocation By IP

This paper presents a unique perspective on Geolocation. It talks about what it is, the problems with it, and how you can use it to provide better protection against malware and hackers.

(more available)
Added: October 20, 2018
image from GTIC Monthly Threat Report March 2018

GTIC Monthly Threat Report March 2018

This monthly threat report takes a look at the month of March 2018. Specifically, it looks at a Cisco VULN, the strength of APT37 a North Korean APT, and where a Chines APT backdoor was found.

(more available)
Added: October 20, 2018
image from The 2017 Global Threat Landscape Report

The 2017 Global Threat Landscape Report

“This report is based exclusively on information collected via a wide range of security services within GravityZone: Security for Virtualized Environments, Security for Endpoints, Security for Mobile and Security for Exchange, consumer-oriented products such as Bitdefender Antivirus, Bitdefender Internet Security or Bitdefender Total Security, as well as from Bitdefender BOX, the innovative solution for protecting devices in the IoT space.”

(more available)
Added: October 20, 2018
image from Network Detection: What Is It Really?

Network Detection: What Is It Really?

This report seeks to help provide important information to clarify what cybersecurity organizations are truly offering.

Added: October 19, 2018
image from The Emotional Side of Virtualization

The Emotional Side of Virtualization

Virtualization is a strategic priority at large companies, and trust plays a crucial role in their choice of cloud service provider and in determining the type of data they store outside company infrastructure, according to a Bitdefender survey of 503 IT decision makers at companies in the US, the UK and Germany with more than 1,000 PCs. Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment, and CIOs have to adapt to the new world. This survey, carried out by iSense Solutions, reveals why companies virtualize, which countries CIOs trust and what kind of data companies care most about.

(more available)
Added: October 19, 2018
image from Making Threat Intelligence Actionable

Making Threat Intelligence Actionable

From the report, “AED is an acronym we‘ve coined, short for “Acquire, Enrich, Detect.” It describes the process we use internally to collect threat intelligence and actualize our ability to identify when networks are under attack. We do this in the shortest possible time, with the highest degree of confidence, by looking ONLY at the raw network traffic.”

(more available)
Added: October 18, 2018
image from 2017 Threat Monitoring Report

2017 Threat Monitoring Report

This report is based on a survey of a wide number of cybersecurity professionals, and deals with a variety of issues ranging from the threat landscape to incident recovery.

(more available)
Added: October 17, 2018
image from AI Based Prevention And Detection

AI Based Prevention And Detection

This report discusses the new evolution in Endpoint Security.

Added: October 17, 2018
image from Cyber-Security Perceptions And Realities: A View From The C-Suite

Cyber-Security Perceptions And Realities: A View From The C-Suite

This Report is based on the findings of a survey that sought to understand the priorities and viewpoint of the Executive members of multiple organizations around the world, as pertains to cyber-secuirty issues.

(more available)
Added: October 17, 2018
image from 2018 Threat Hunting Report

2018 Threat Hunting Report

This report focusses on the issues of Threat Hunting. It details the growth in Threat Hunting, the trends and processes surrounding it, and what it can mean for your organization.

(more available)
Added: October 16, 2018
image from DDoS Threat Report Q1 2017

DDoS Threat Report Q1 2017

This report takes a look at the DDoS threats that occurred in the first quarter of 2017.

Added: October 16, 2018
image from Delivering Strong Security In A HyperConverged Data Center Environment

Delivering Strong Security In A HyperConverged Data Center Environment

From The Report, “Just as hyperconvergence in the data center will have a huge impact on how systems and data are managed, it will have significant repercussions for information security. Any organization that thinks security does not need to change in a hyperconverged environment puts data and systems reliability at risk.”

(more available)
Added: October 16, 2018
image from Sleeper Awake: RSA Conference Transcript 2016

Sleeper Awake: RSA Conference Transcript 2016

This is the transcript from Amit Yoran’s presentation at the 2016 RSA Conference.

Added: October 16, 2018
image from Written Testimony US House Committee On Energy And Commerce

Written Testimony US House Committee On Energy And Commerce

This is the transcript of testimony given before the US House Committee On Energy And Commerce.

Added: October 16, 2018
image from Containing Targeted Cyber Attacks: Best Practices For Gaining Control Over The Enterprise Endpoint Environment

Containing Targeted Cyber Attacks: Best Practices For Gaining Control Over The Enterprise Endpoint Environment

This paper dicusses the best pracitices for gaining conrtol over Cyber Attacks and the Incident Response action.

Added: October 15, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 24, 2025 04:08 UTC (build b1d7be4)