Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from Seven Decision Points When Considering Containers

Seven Decision Points When Considering Containers

The decision to deploy code to containers versus virtual machines or dedicated servers has some unique characteristics. Amalgam Insights has identified seven key decision points that should be considered when choosing to deploy to containers. These seven decision points can act as guideposts that will help point to or from using containers.

(more available)
Added: October 21, 2018
image from Smartly Selected Infrastructure For GDPR Compliance

Smartly Selected Infrastructure For GDPR Compliance

This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance.

(more available)
Added: October 21, 2018
image from State of the Internet - Security Q1 2017 report

State of the Internet - Security Q1 2017 report

This paper represents analysis and research based on data from Akamai’s global infrastructure and routed Distributed Denial of Service (DDoS) solution.

(more available)
Added: October 21, 2018
image from Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

Technical Analysis Report On Rowdy, A New Type Of IOT Malware Exploiting STB's

This report offers a breakdown and analysis of the actions and behaviors of Rowdy, a new type of IoT Malware.

(more available)
Added: October 21, 2018
image from The Business Of Hacking

The Business Of Hacking

This paper will explore the business of hacking: the different ways people make money by hacking, the motivations, the organization. It will break down the businesses’ profitability and risk levels, and provide an overall SWOT analysis. From this, opportunities for disruption will be discussed and a competitive approach for disrupting the business of hacking will be laid out.

(more available)
Added: October 21, 2018
image from Tone at the Top and Third Party Risk

Tone at the Top and Third Party Risk

A key takeaway from this research is that accountability for managing third party risk is dispersed throughout the organization. Not having one person or function with ownership of the risk is a serious barrier to achieving an effective third part risk management program.

(more available)
Added: October 21, 2018
image from 2015 Cyber Security Survey: Major Australian Businesses

2015 Cyber Security Survey: Major Australian Businesses

A report that was created by the 2015 Australian Cyber Security Centre (ACSC) Cyber Security Survey of major Australian businesses was conducted to obtain a better picture of Australian organisations’ understanding of cyber threats and how they are positioned to secure their networks.

(more available)
Added: October 20, 2018
image from 2016 Cost of Cyber Crime Study & the Risk of Business Innovation

2016 Cost of Cyber Crime Study & the Risk of Business Innovation

From the report, “Cyber attacks are a reality for all organizations. In this year’s cost of cyber crime research they focus on the importance of thriving and innovating while simultaneously reducing the financial and reputational consequences of a cyber attack. An important finding of this research is that a high security profile, as determined by the deployment of specific practices and technologies, will support business innovation and reduce the cost of cyber crime.”

(more available)
Added: October 20, 2018
image from 2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

This report provides complete survey reports, expert analysis, and thoughts from leading experts in the field.

Added: October 20, 2018
image from 21st CEO Survey: The Anxious Optimist In The Corner Office

21st CEO Survey: The Anxious Optimist In The Corner Office

This survey report offers insights into the thoughts and experiences of CEO’s including what threats keep them up at night.

(more available)
Added: October 20, 2018
image from A Unified Approach To Rugged Device Management

A Unified Approach To Rugged Device Management

This whitepaper will delve into the evolution of rugged devices, the management challenges associated with such deployments, and how a UEM solution can address these challenges to enable a fully connected environment that is both manageable and secure.

(more available)
Added: October 20, 2018
image from Beneath the surface of a cyberattack

Beneath the surface of a cyberattack

In Beneath the Surface of a Cyberattack: A Deeper Look at Business Impacts, Deloitte has leveraged their experience with a variety of cyber incidents and their deep industry knowledge to illustrate how 14 impact factors—including many that are not often visible—can affect an organization in the days, months, and years following a cyberattack.

(more available)
Added: October 20, 2018
image from Building Technology Infrastructure For Learning

Building Technology Infrastructure For Learning

This report from the Department Of Education provides insight into good technoglogy infrastructure for educational purposes.

Added: October 20, 2018
image from Concept Paper on a proposed categorisation methodology for cyber risk

Concept Paper on a proposed categorisation methodology for cyber risk

The CRO Forum looked into the issues around cyber resilience in the paper it published in 2014. In this paper, cyber risk was defined as the risk of doing business in the cyber environment. This paper builds on the 2014 paper to focus on how to address the challenges around the collection of data to support improved cyber resilience.

(more available)
Added: October 20, 2018
image from CyberThreat Report: The Malware Wars Are Heating Up

CyberThreat Report: The Malware Wars Are Heating Up

The purpose of this report is to help businesses better understand the risks that they are facing. This report asks businesses to be mindful that they should take the new security landscape seriously.

(more available)
Added: October 20, 2018
image from DDoS Attacks Advancing and Enduring: A SANS Survey

DDoS Attacks Advancing and Enduring: A SANS Survey

Distributed denial of service (DDoS) attacks continue to grow in frequency, sophistication and bandwidth. Due to a recent SANS survey, 378 security and network managers reveal that they are experiencing more frequent and sophisticated DDoS attacks These and other trends are discussed in the rest of this report.

(more available)
Added: October 20, 2018
image from DDoS Trends Report Q4 2016

DDoS Trends Report Q4 2016

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign. It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q4 2016.

(more available)
Added: October 20, 2018
image from Email Archiving: It's Time For An Update

Email Archiving: It's Time For An Update

This report offers a guide to understanding the importance of email archiving.

Added: October 20, 2018
image from Exposing The Enemy Within

Exposing The Enemy Within

This e-Book takes a look at what your DNS can tell you about your security Posture.

Added: October 20, 2018
image from Global Survey On Internet Security And Trust

Global Survey On Internet Security And Trust

This report is based on a survey that involved over one thousand individuals in twenty four countries.

Added: October 20, 2018
image from Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

This report aims to investigate the role of the Internet in facilitating drugs trade. It is commissioned by the Research and Documentation Centre (Wetenschappelijk Onderzoek- en Documentatiecentrum, WODC), the independent research arm of the Ministry of Security and Justice in the Netherlands. Special attention will therefore be paid to the role of Dutch actors in facilitating this trade.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 29
  • 30
  • 31
  • 32
  • 33
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)