Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from Cloud And Hybrid Environments: The State Of Security

Cloud And Hybrid Environments: The State Of Security

AlgoSec recently surveyed 450 C-level executives and senior security and network professionals to investigate the hybrid cloud security strategies of their organizations. The survey revealed that many organizations are embracing hybrid cloud as part of their enterprise infrastructure, and plan to increase their adoption of cloud platforms over the next three years. However, the majority of enterprises do have some serious security concerns and encounter significant challenges when managing security across hybrid environments, both during and after cloud migrations.

(more available)
Added: February 17, 2019
image from The Faces of Friendly Fraud: Six Best Practices For Controlling The Damage

The Faces of Friendly Fraud: Six Best Practices For Controlling The Damage

This report takes a closer look at the threat of friendly fraud, by first explaining the spectrum of friendly fraud and exploring whether merchants and issuers are in fact “training” cardholders to initiate disputes. It also examines the balancing act that merchants and issuers must navigate while trying to reduce friendly fraud, while also preserving important customer relationships. Lastly, it details how two companies are addressing the problem, and then outlines six best practices for controlling the damage.

(more available)
Added: February 13, 2019
image from Open Banking & APIs Report 2017

Open Banking & APIs Report 2017

The Open Banking & API Report 2017 gives insight into the nascent landscape of Open Banking in Europe. Divided into two parts, it aims to give you both the basis of knowledge necessary to understand the latest developments on the topic, as well as practical examples and best practices in Open Banking. First, the report elaborates on the innovations in Open Banking and the issues that still stand in the way of universal adoption. Afterwards, we will dive into the best practices and new business models in both banking and fintech.

(more available)
Added: February 13, 2019
image from Lloyd's City Risk Index: North America

Lloyd's City Risk Index: North America

This is the North American section of the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Lloyd's City Risk Index: Middle East and Africa

Lloyd's City Risk Index: Middle East and Africa

This paper provides the Middle East and African insights from the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Lloyd's City Risk Index: Latin America

Lloyd's City Risk Index: Latin America

This is the Latin American focussed section of the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Lloyd's City Risk Index: Asia Pacific

Lloyd's City Risk Index: Asia Pacific

This report provides the Asia Pacific focussed section of the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Lloyds City Risk Index: Europe

Lloyds City Risk Index: Europe

This report summarizes Lloyd’s City Risk Index report for the cities of Europe.

Added: February 13, 2019
image from Bashe Attack: Global Infection By Contagious Malware

Bashe Attack: Global Infection By Contagious Malware

This report explores how a ransomware attack might take place and what the impacts would be on governments, businesses, and the insurance sector. In the scenario, the malware enters company networks through a malicious email, which, once opened, encrypts all the data on every device connected to the network. The email is forwarded to all contacts automatically to infect the greatest number of devices. Companies of all sizes and in all sectors are forced to pay a ransom to decrypt their data or to replace their infected devices.

(more available)
Added: February 13, 2019
image from From Login to Logout: Continuous Authentication with Behavioral Biometrics

From Login to Logout: Continuous Authentication with Behavioral Biometrics

This report offers insight into authentication. It discusses some key problems with various standard authentication processes and highlights ways that authentication can be improved.

(more available)
Added: February 13, 2019
image from Behavioral Biometrics in a PSD2 World

Behavioral Biometrics in a PSD2 World

This report offers insight into the changes occurring in the financial services industry as relates to the revised Payment Services Directive (PSD2).

(more available)
Added: February 13, 2019
image from Help America Vote Act (HAVA) Funding and Critical Infrastructure Security

Help America Vote Act (HAVA) Funding and Critical Infrastructure Security

This report offers insights and guides into the new Help America Vote Act.

Added: February 12, 2019
image from A Fresh Look At Security Analytics

A Fresh Look At Security Analytics

In an interview with Tom Field, senior vice president of editorial at Information Security Media Group, Gidwani discusses: • How security analytics is commonly used today; • The potential of automation; • How orchestration impacts efficiency and scale.

(more available)
Added: February 12, 2019
image from Addressing Analyst Fatigue In The SOC

Addressing Analyst Fatigue In The SOC

This whitepaper is intended to help firms identify the symptoms of SOC Analyst fatigue, recognize the underlying causes and evaluate recommendations for addressing the problem.

(more available)
Added: February 12, 2019
image from Applying The Diamond Model For Threat Intelligence To The Star Wars' Battle of Yavin

Applying The Diamond Model For Threat Intelligence To The Star Wars' Battle of Yavin

Using an important analogy from Star Wars, this report provides insight into threat intelligence. May the Force Be With You.

(more available)
Added: February 12, 2019
image from Quantifying The Attacker's First-Mover Advantage

Quantifying The Attacker's First-Mover Advantage

This report measures the difference in days between when an exploit for a vulnerability becomes publicly available (Time to Exploit Availability) and when a vulnerability is first assessed (Time to Assess). A negative delta indicates that the attacker has an opportunity to exploit a vulnerability before the defender is even aware of the risk. The sample set used for this analysis is based on the 50 most prevalent vulnerabilities from nearly 200,000 unique vulnerability assessment scans.

(more available)
Added: February 12, 2019
image from The Power of Predictive IT

The Power of Predictive IT

This report posits the following, “When effectively harnessed, AI and ML can form the core of a dynamic predictive IT system, saving money, streamlining operations, and raising productivity as organizations become more adept at avoiding operational, and security issues that could affect their bottom line.”

(more available)
Added: February 9, 2019
image from The Cyber Resilience of Canadian Organizations

The Cyber Resilience of Canadian Organizations

Scalar’s study of the cyber resilience of Canadian organizations finds there is a new normal across the threat landscape. Cyber security incidents – whether they be exfiltration, infiltration, or denial of service – are now occurring on a regular basis. To address this, the focus of cyber security efforts is shifting from an emphasis on protection against attacks, to improving the detection of malicious actors on the network, and responding to and recovering from incidents as quickly as possible. The findings of the 2019 Scalar Security Study reflect on these new trends and introduce cyber resilience as a security theme that emphasizes the importance of business continuity and the need for organizations to return to normal operations and a trusted state after an incident has occurred

(more available)
Added: February 9, 2019
image from Splunk 2019 Predictions

Splunk 2019 Predictions

At Splunk, we’re working on shaping the future. Our experts are embracing new developments, focusing on the future of artificial intelligence (AI) and machine learning (ML), IT operations, security and IoT. Pulling together insights from our thousands of customers and our dedicated research teams, our experts have assembled a shortlist of the top predictions for 2019.

(more available)
Added: February 9, 2019
image from Splunk 2018 Predictions

Splunk 2018 Predictions

At Splunk, our experts don’t read palms, but they do look into the future. The future of artificial intelligence (AI) and machine learning (ML), IT operations, security, and IoT. Join us once again as we connect with our renowned experts to capture their predictions for the next big thing in their fields.

(more available)
Added: February 9, 2019
image from The State Of The Federal IT Landscape

The State Of The Federal IT Landscape

From the report, “For the State of the Federal IT Landscape report, OneLogin commissioned CITE Research to conduct an online, in-depth survey of 150 federal IT professionals in the United States. The goal of the survey was to understand: The current federal IT landscape, Security concerns and challenges facing federal agencies, IT plans with regard to the cloud, Technologies in use or being considered to address concerns. This survey was conducted in late October of 2018.” Read on to find out more.

(more available)
Added: February 8, 2019
  • ««
  • «
  • 19
  • 20
  • 21
  • 22
  • 23
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)