Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from SecureWorks Threat Intelligence Executive Monthly Report November 2016

SecureWorks Threat Intelligence Executive Monthly Report November 2016

This report from November 2016 takes a look at 6 different types of threat events and discusses the insights gleaned from research about those events.

(more available)
Added: October 16, 2018
image from The Cyber Readiness of Canadian Organizations

The Cyber Readiness of Canadian Organizations

The purpose of this research is to study how Canadian organizations are responding to cyber security threats and the need to invest in enabling security technologies.

(more available)
Added: October 16, 2018
image from The Moral Component Of Cross Domain Conflict

The Moral Component Of Cross Domain Conflict

This is the final report of a study commissioned by the UK Ministry of Defence (MOD) through the Defence Human Capability Science and Technology Centre (DHCSTC) framework. The study was conducted over a period of six weeks and examines the academic debate pertaining to the moral landscape of conflict that spans different military domains (air, maritime, land, space, cyber). The investigation which is the subject of this report was commissioned by the Programme and Delivery Directorate of the Defence Science and Technology Laboratory (Dstl).

(more available)
Added: October 16, 2018
image from Top Threats To Cloud Computing: Deep Dive

Top Threats To Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the top threat’s for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. They encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

(more available)
Added: October 16, 2018
image from 2015 Information security breaches survey

2015 Information security breaches survey

A report from the government of the United Kingdom detailing the findings of a survey regarding security breaches in 2015.

(more available)
Added: October 15, 2018
image from 2017 Internet Crime Report

2017 Internet Crime Report

The 2017 Internet Crime Report emphasizes the IC3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), Ransomware, Tech Support Fraud, and Extortion. The report also highlights the Elder Justice Initiative promoting justice for the nation’s seniors. In 2017, IC3 received a total of 301,580 complaints with reported losses exceeding $1.4 Billion.

(more available)
Added: October 15, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

The fifth annual State of DevOps Report confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns.

(more available)
Added: October 15, 2018
image from 3 Reasons Your IAM Is Leaking Revenue

3 Reasons Your IAM Is Leaking Revenue

Because Identity Management has different use cases depending on whether you’re using it for consumers, other busi- nesses or your own employees, this paper will outline how adopting an optimized identity management system can help realize revenue.

(more available)
Added: October 15, 2018
image from Always On. Always Up.

Always On. Always Up.

This white paper is geared towards the energy industry and learning about how network security can help maintain cybersecurity protections specifically in that industry.

(more available)
Added: October 15, 2018
image from Annual Worldwide Infrastructure Security Report, Vol 11

Annual Worldwide Infrastructure Security Report, Vol 11

The data within this document is based on the collective experiences, observations and concerns of the global operational security community. Arbor Networks has collected this data through a survey conducted in October 2015.

(more available)
Added: October 15, 2018
image from Automation: The Future Of Network Visibility

Automation: The Future Of Network Visibility

This whitepaper provides some insights to consider for automating your SIEM, NMS, packet capture device, and other tool deployments.

Added: October 15, 2018
image from Containing Targeted Cyber Attacks: Best Practices For Gaining Control Over The Enterprise Endpoint Environment

Containing Targeted Cyber Attacks: Best Practices For Gaining Control Over The Enterprise Endpoint Environment

This paper dicusses the best pracitices for gaining conrtol over Cyber Attacks and the Incident Response action.

Added: October 15, 2018
image from Cryptowall Report

Cryptowall Report

This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall.

(more available)
Added: October 15, 2018
image from Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

What is the balance of economic benefits and costs conferred upon societies by cyber technologies, also designated here as information and communication technologies (ICT)? And how might that balance change in coming years? This report, prepared as a quantitative foundation for work sponsored by the Zurich Insurance Group, addresses these questions by assessing the current pattern of benefits and costs in countries and globally, mapping their apparent trajectory in recent years, and exploring their possible futures through 2030.

(more available)
Added: October 15, 2018
image from Cyber Threats To The Entertainment And Media Industries

Cyber Threats To The Entertainment And Media Industries

Discover why the entertainment and media industries are valuable targets for APT groups and hacktivists seeking influence.

Added: October 15, 2018
image from Cyberattacks Against Intelligent Transportation Systems

Cyberattacks Against Intelligent Transportation Systems

There is currently very little published research discussing the cybersecurity threats against ITS. In this paper, we first explored real-world ITS cyberattacks and their impact. As cyberattacks and attackers go hand-in-hand, we discussed the most likely perpetrators and their goals and motivations for attacking ITS. We then applied our knowledge of current cyberattacks to develop and analyze future cyberattack scenarios against ITS and Smart Roads.

(more available)
Added: October 15, 2018
image from General Data Protection Regulation: The Mobile Implications

General Data Protection Regulation: The Mobile Implications

This paper is designed to help businesses manage their mobile data risks in relation to GDPR, which will affect almost every global organisation.

(more available)
Added: October 15, 2018
image from Global Application and Network Security Report

Global Application and Network Security Report

From the report, “This research provides a comprehensive and objective review of 2015 cyber-attacks from both a business and a technical perspective. It offers best practice advice for organizations to consider when planning for cyber-attack protection in 2016."

(more available)
Added: October 15, 2018
image from Mobile Security Index 2018

Mobile Security Index 2018

This paper discusses what organizations fear and what security measures they are taking to mitigate risks. To find out, they commissioned independent research, surveying more than 600 mobility professionals. The results were eye-opening.

(more available)
Added: October 15, 2018
image from Privilege Security For The New Perimeter

Privilege Security For The New Perimeter

Security in an era of next-generation technologies, expanding digital footprints, and widely dispersed user bases requires a comprehensive hybrid approach, delivered through privileged access management (PAM).

(more available)
Added: October 15, 2018
image from Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

This report documents research conducted as part of the project “Building a Strategy for Cyber Support to Corps and Below.” RAND Arroyo Center was asked by U.S. Army Cyber Command’s G35 office to develop and document an Army strategy for providing cyber sup- port to corps and below (CSCB) units that describes how the Army should use its available resources to achieve mission objectives.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 35
  • 36
  • 37
  • 38
  • 39
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)