Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from ISP DDoS Protection May Not Cover All Bases

ISP DDoS Protection May Not Cover All Bases

This short article gives a 10 reasons why an ISP’s DDoS Protection may not be able to actually protect an organization.

(more available)
Added: October 20, 2018
image from Prepare For The Growing Threats Of Mobile Security

Prepare For The Growing Threats Of Mobile Security

This review of the events of 2016, seeks to offer insight into the future of 2017.

Added: October 20, 2018
image from Privacy by Design & GDPR

Privacy by Design & GDPR

This paper provides a clearly articulated look at the GDPR.

Added: October 20, 2018
image from Ransomware As A Service (RaaS): Deconstructing Philadelphia

Ransomware As A Service (RaaS): Deconstructing Philadelphia

This report provides a thorough analysis of Philadelphia, a a chilling example of ransomware as a service.

Added: October 20, 2018
image from Ransomware: Many Victims Few Solutions Infographic

Ransomware: Many Victims Few Solutions Infographic

This infographic takes a look at Ransomware and provides a brief overview of discusses some solutions.

Added: October 20, 2018
image from The Economics Of Defense Security

The Economics Of Defense Security

This is a useful article that takes a look at the financial numbers of paying for a defensive strategy vs. paying for a breach. Perfect for accountants, and those who need to understand data from a purely financial side.

(more available)
Added: October 20, 2018
image from The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda. As authoritarian regimes seek to undermine democratic institutions, Western societies must harness their current— though fleeting—competitive advantage in technology to prepare for the next great leap forward in political warfare.

(more available)
Added: October 20, 2018
image from The Ransomware Economy

The Ransomware Economy

This paper discusses the How and Why the Dark Web Marketplace for Ransomware Is Growing at a Rate of More Than 2,500% Per Year

(more available)
Added: October 20, 2018
image from Thought Leadership 2016 Programme: Key Findings

Thought Leadership 2016 Programme: Key Findings

The 2016 Thought Leadership programme convened by Corsham Institute, in conjunction with RAND Europe and St George’s House, examined a number of crucial dimensions of our connected society. The programme facilitated the gathering of a diverse set of experts and influential leaders from various sectors to discuss challenges and opportunities, share experiences, and build a network. To give a brief glimpse of these discussions, we have produced this Key Findings report to provide participants, stakeholders and interested parties with a strong sense of both the subjects covered during our deliberations, as well as some of the issues, which still need to be tackled going forward.

(more available)
Added: October 20, 2018
image from Top 10 Global Business Risks of 2017

Top 10 Global Business Risks of 2017

The sixth annual Allianz Risk Barometer identifies the corporate perils for 2017 and beyond, based on the responses of more than 800 risk experts from 40+ countries around the globe.

(more available)
Added: October 20, 2018
image from Web Attack Survival Guide

Web Attack Survival Guide

This guide provides a playbook for helping a company prepare for and handle web attacks.

Added: October 20, 2018
image from 2016 Cost of Data Center Outages

2016 Cost of Data Center Outages

Previously published in 2010 and 2013, the purpose of this third study is to continue to analyze the cost behavior of unplanned data center outages. According to our new study, the average cost of a data center outage has steadily increased from $505,502 in 2010 to $740,357 today (or a 38 percent net change).

(more available)
Added: October 19, 2018
image from 2016 State of Security Operations

2016 State of Security Operations

In the State of Security Operations Maturity report, Hewlett Packard Enterprise provides updates to the capabilities, lessons learned, and performance levels of security operations based upon maturity assessments performed on a worldwide organizations.

(more available)
Added: October 19, 2018
image from 2017 Web Application Threat Trend Report

2017 Web Application Threat Trend Report

Readers are encouraged to use this report to get a better understanding of the current threat landscape, including trends specific to different contexts like region, time of day, industry, and more, in order to better fine-tune defenses for meeting the security needs of their unique environments.

(more available)
Added: October 19, 2018
image from 2018 Threat Predictions

2018 Threat Predictions

This is a helpful infographic that reveals threat predictions for 2018.

Added: October 19, 2018
image from A 360-Degree Guide To Choosing And Migrating To A New Email Client

A 360-Degree Guide To Choosing And Migrating To A New Email Client

This white paper seeks to offer some insight into migrating to a new email client.

Added: October 19, 2018
image from Advanced Threat Report: Europe, the Middle East and Africa

Advanced Threat Report: Europe, the Middle East and Africa

This report provides you with unique insights into Europe, Middle East and Africa’s (EMEA’s) threat landscape for the second half of 2015.

(more available)
Added: October 19, 2018
image from ASEC Report Volume 88 Q3 2017

ASEC Report Volume 88 Q3 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 3rd Qtr. of 2017.

(more available)
Added: October 19, 2018
image from Cloud Security Defense: In Detail If Not In Depth

Cloud Security Defense: In Detail If Not In Depth

This report discusses the results of a survey conducted in 2017 to determine what information, concerns and security choices organizations are making with the cloud and the security of the cloud.

(more available)
Added: October 19, 2018
image from Control Business Data Risks Through End User Data Protection And Governance

Control Business Data Risks Through End User Data Protection And Governance

This Technology Spotlight examines the need for increased visibility and control to better manage and mitigate the risk presented by a decentralized corporate data environment.

(more available)
Added: October 19, 2018
image from DDoS Threat Report Q2 2017

DDoS Threat Report Q2 2017

This report takes a look at the DDoS threats that occurred in the second quarter of 2017.

Added: October 19, 2018
  • ««
  • «
  • 30
  • 31
  • 32
  • 33
  • 34
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 20:08 UTC (build b1d7be4)