Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from Global Application & Network Security Report 2017-2018

Global Application & Network Security Report 2017-2018

This report highlights the trends and threats of 2017 as observed by Radware.

Added: October 19, 2018
image from Key Technologies Needed To Advance Mission Critical IoT

Key Technologies Needed To Advance Mission Critical IoT

This white paper outlines the key challenges you face across the 3 layers of the IoT ecosystem—device, wireless communications, and network and system—and details the technologies you need to overcome them and realize success in the mission-critical IoT.

(more available)
Added: October 19, 2018
image from Lloyds City Risk Index 2015-2025

Lloyds City Risk Index 2015-2025

Lloyd’s City Risk Index 2015-2025, shows that trillions of dollars are at risk from manmade and natural disasters – disasters that have occurred in the past and are likely to do so again in the future. The nature of these threats is changing too. Certain extreme weather events linked to climate change are increasing in severity and frequency. Manmade threats, such as cyber attack and market crash, are increasingly significant as companies expand into new markets and territories.

(more available)
Added: October 19, 2018
image from Offense-In-Depth: Reflective Social Engineering

Offense-In-Depth: Reflective Social Engineering

This report takes a look at phishing campaings and why they work so easily.

Added: October 19, 2018
image from Preparing For NGAV At Scale

Preparing For NGAV At Scale

This Paper is subtitled “Stopping Attacks In Progress Starts With Asking The Right Questions” The paper tries to discuss and reveal the questions that should be asked.

(more available)
Added: October 19, 2018
image from Quarterly Threat Report Q2 2017

Quarterly Threat Report Q2 2017

This Quarterly report offers key takeaways from the second Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 19, 2018
image from Ransomware Survey Infographic

Ransomware Survey Infographic

To get a more complete sense of the impact of ransomware beyond the headlines and statistics, we surveyed IT professionals who have had to deal with it firsthand.

(more available)
Added: October 19, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

October 2015 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 19, 2018
image from Strengthen Your Defenses Against Cybercrime

Strengthen Your Defenses Against Cybercrime

This ebook provides insight based on a survey that sought to understand the state of email cybersecurity.

Added: October 19, 2018
image from The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed organizations in Germany about their approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 19, 2018
image from The True Cost Of Compliance With Data Protection Regulations

The True Cost Of Compliance With Data Protection Regulations

Ponemon Institute and Globalscape conducted The True Cost of Compliance with Data Protection Regulations to determine the full economic impact of compliance activities for a representative sample of 53 multinational organizations. An earlier study was completed in 2011 and those findings are compared to this year’s results.

(more available)
Added: October 19, 2018
image from The Weaponization Of Information: The Need For Cognitive Security

The Weaponization Of Information: The Need For Cognitive Security

This paper presents the Testimony of Rand Waltzman presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017.

(more available)
Added: October 19, 2018
image from US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

This paper takes a look at the cities of the US, and the cyber threats that occurred there.

Added: October 19, 2018
image from Verisign DDoS Trends Report Q1 2017

Verisign DDoS Trends Report Q1 2017

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services from Jan. 1, 2017 through March 31, 2017 (Q1 2017). It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q1 2017.

(more available)
Added: October 19, 2018
image from World Economic Situations And Prospects: Update as of mid-2018

World Economic Situations And Prospects: Update as of mid-2018

The present document updates World Economic Situation and Prospects 2018 (United Nations publication, Sales No. E.18.II.C.2), released in December 2017.

(more available)
Added: October 19, 2018
image from 2015 State Of The Phish

2015 State Of The Phish

To provide a clearer idea of where, and how, organizations make themselves most vulnerable to phishing attacks, ThreatSim has prepared this 2015 report, which pools two sources of data: 1) ThreatSim’s anonymous data aggregated across our customer base, involving millions of simulated email phishing. 2) A survey of information technology executives, administrators, and information security professionals.

(more available)
Added: October 18, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.

Added: October 18, 2018
image from 2017 Ransomware Report

2017 Ransomware Report

From The Report, “With global ransomware damages predicted to exceed $5 billion this year, it is no surprise that ransomware is the fastest growing security threat. As this year’s global attacks have made national news, businesses of all sizes have become increasingly aware of the looming ransomware threat and the challenge of staying protected. Infected companies race the clock to minimize data loss, downtime, and reputation damage. With the seemingly endless profitability, anonymity and ease of execution it doesn’t appear cybercriminals will be turning their back on ransomware anytime soon. Companies are right to expect another year filled with attacks and new variants. The question is how can companies block these attacks before ransom is demanded, and their data along with their reputation is put at risk.”

(more available)
Added: October 18, 2018
image from 2018 Malware Forecast

2018 Malware Forecast

In this report, they review malicious activity that SophosLabs analyzed and protected their clients from in 2017. They take that data and project what can be expected from 2018.

(more available)
Added: October 18, 2018
image from ASEC Report Volume 87 Q2 2017

ASEC Report Volume 87 Q2 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 2nd Qtr. of 2017.

(more available)
Added: October 18, 2018
image from Bridging The IoT Perception Gap:Information Vs. Operational Technology

Bridging The IoT Perception Gap:Information Vs. Operational Technology

This report is based on a survey that was conducted to observe the differing views and opinions of IT and OT teams.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 31
  • 32
  • 33
  • 34
  • 35
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)