Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from Heads In The Cloud: Misconceptions Hindering Enterpise Cloud Adoption

Heads In The Cloud: Misconceptions Hindering Enterpise Cloud Adoption

Almost all (99%) surveyed ITDMs say that there is or was at least one driver for their organization moving to the cloud. But for all the exuberance surrounding cloud and SaaS, the majority (94 percent) of ITDMs interviewed have or have had at least one concern about their organization moving to the cloud, the most common being data privacy (61 percent).

(more available)
Added: October 22, 2018
image from How Collaboration Can Optimize Security Operations

How Collaboration Can Optimize Security Operations

The executive summary of this report says, “The secret to advanced threat preparedness may actually lie within your organization — your current people, processes and technologies…Enterprises are coming to the realist that a fragmented or compartmentalized security operations design is ineffective against today’s advanced security threats.”

(more available)
Added: October 22, 2018
image from Long-term Data Retention Drivers and Trends

Long-term Data Retention Drivers and Trends

There are many reasons to archive data. For too many organizations, “archiving” is immediately presumed to be a cumbersome, unattainable, legacy process that IT had previously deprioritized, while erroneously believing that a “backup copy” held for an extended period of time was a sufficient alternative. Every aspect of that presumption is incorrect—modern archiving is a critical and compelling aspect of nearly every IT organization’s forward-looking strategy.

(more available)
Added: October 22, 2018
image from Practitioner’s Guide to Building a Security Operations Center (SOC)

Practitioner’s Guide to Building a Security Operations Center (SOC)

This white paper goes into detail about what is needed to build and maintain an SOC, the types of technologies and skillsets required, and advantages of an all-in-one security monitoring platform.

(more available)
Added: October 22, 2018
image from Regional Advanced Threat Report: Asia Pacific H1 2015

Regional Advanced Threat Report: Asia Pacific H1 2015

This report discusses trends in the cyber security environment in Asia Pacific from January to June 2015.

Added: October 22, 2018
image from Report Summary: Network Management Megatrends 2016

Report Summary: Network Management Megatrends 2016

This is the fourth megatrends study. For this latest version, they have carried forward a number of ongoing questions and threads that are designed to track how the network management landscape is changing over time. They’ve also included many new questions and queries intended to help us characterize and quantify the very latest technology trends. In particular, new questions were added in this report to begin assessing whether hybrid clouds, advanced analytics, and/or the Internet of Things were having an impact on network management tools and practices.

(more available)
Added: October 22, 2018
image from Reporting to the Board: Where CISOs and the Board are Missing the Mark

Reporting to the Board: Where CISOs and the Board are Missing the Mark

This report details how IT reports are not effectively communicating the dangers of cyber threats so that the boards of organizations can make good decisions.

(more available)
Added: October 22, 2018
image from State of the Internet Security 2nd Quarter 2017

State of the Internet Security 2nd Quarter 2017

This is Akamai’s State of The Internet Security report from the second quarter of 2017

Added: October 22, 2018
image from The Five Steps To Managing Third Party Risk

The Five Steps To Managing Third Party Risk

This white paper tackles the subject of how outsourced labor can cause cybersecurity risk.

Added: October 22, 2018
image from Threat Actor - APT28

Threat Actor - APT28

This report takes a look at ATP28 a recognized state sponsored threat actor operating out of Russia.

Added: October 22, 2018
image from To The Point: Reporting Cybersecurity and IT Risk to the Board

To The Point: Reporting Cybersecurity and IT Risk to the Board

This report provides helpful insight into why board executives don’t understand Cybersecurity issues. It also adds helpful advice for how to convince the board of the importance of these issues.

(more available)
Added: October 22, 2018
image from Understanding Cyber RIsk Management vs Uncertainty With Confidence

Understanding Cyber RIsk Management vs Uncertainty With Confidence

This white paper provides an analysis of Risk Management and overcoming uncertainty.

Added: October 22, 2018
image from Accelerate: State Of DevOps Strategies For A New Economy

Accelerate: State Of DevOps Strategies For A New Economy

This report examines the impact that cloud adoption, use of open source software, organizational practices (including outsourcing), and culture all have on software delivery performance.

(more available)
Added: October 21, 2018
image from Boards Turn To The Talent Agenda

Boards Turn To The Talent Agenda

This report discusses how the boards of organizations are changing their hiring practices due to the impact of cybersecurity incidents.

(more available)
Added: October 21, 2018
image from ENISA Threat Taxonomy: A tool for structuring threat information.pdf

ENISA Threat Taxonomy: A tool for structuring threat information.pdf

The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015. The consolidated threat taxonomy is an initial version: in 2016, ENISA plans to update and expand it with additional details, such as definitions of the various threats mentioned.

(more available)
Added: October 21, 2018
image from Enterprise Phishing Resiliency And Defense Report

Enterprise Phishing Resiliency And Defense Report

This annual report takes a specific look at phishing campaigns in 2017.

Added: October 21, 2018
image from It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

This paper presents the testimony, of Martin Libicki, presented before the House Armed Services Committee on March 1, 2017.

Added: October 21, 2018
image from KSN Report:Ransomware in 2016-2017

KSN Report:Ransomware in 2016-2017

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period, as well as research into the ransomware threat landscape by Kaspersky Lab experts.

(more available)
Added: October 21, 2018
image from Microsoft As A Trusted Advisor And Partner On Cyber Resilience

Microsoft As A Trusted Advisor And Partner On Cyber Resilience

This whitepaper provides information about developing your organization’s cyber resiliance.

Added: October 21, 2018
image from New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

In August 2017, Cyber adAPT partnered with research and smart data firm Aberdeen Group to conduct a threat detection survey. The results provide critical data and the ability to analyze a variety of detection technology questions and scenarios.

(more available)
Added: October 21, 2018
image from Quarterly Report Q2 2017

Quarterly Report Q2 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 21, 2018
  • ««
  • «
  • 28
  • 29
  • 30
  • 31
  • 32
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)