Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from Threat Intelligence Executive Reprot 2017: Volume 6

Threat Intelligence Executive Reprot 2017: Volume 6

This Threat Report takes a look at some of the events of late 2017. Specifically, it looks at self-propagating malware, a specific Microsoft Office vuln, and multiple espionage campaigns that target energy utility companies.

(more available)
Added: October 15, 2018
image from White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime.

(more available)
Added: October 15, 2018
image from X-Force Threat Intelligence Index 2018

X-Force Threat Intelligence Index 2018

In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations.

(more available)
Added: October 15, 2018
image from 2015 Internet Crime Report

2015 Internet Crime Report

The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS).

(more available)
Added: October 14, 2018
image from 2016 Midmarket Threat Summary Report

2016 Midmarket Threat Summary Report

This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats.

(more available)
Added: October 14, 2018
image from 2016 State Of Privacy & Security Awareness: The Story Behind The Story

2016 State Of Privacy & Security Awareness: The Story Behind The Story

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 14, 2018
image from 2017 IT Security Privacy Survey

2017 IT Security Privacy Survey

When tackling cyber risk, board involvement and effective communication continue to drive performance. Learn more in this report on the key findings from Protiviti’s 2017 Security and Privacy Survey.

(more available)
Added: October 14, 2018
image from An Introduction To Machine Learning For Mobile Security

An Introduction To Machine Learning For Mobile Security

A close inspection of one of the most exciting and promising fields of research in 2017, and how it might be applied to the fast-moving world of mobile security.

(more available)
Added: October 14, 2018
image from Business Email Compromise (BEC) Attack Trends Report

Business Email Compromise (BEC) Attack Trends Report

This report is a breakdown of Agari’s experience with Business Email Compromise and attacks.

Added: October 14, 2018
image from Cyber Vulnerability: Where do you Stand

Cyber Vulnerability: Where do you Stand

This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data.

(more available)
Added: October 14, 2018
image from Enhancing Resilience through Cyber Incident Data Sharing and Analysis

Enhancing Resilience through Cyber Incident Data Sharing and Analysis

This document enumerates and evaluates consensus data categories that enterprise risk owners and insurers could use to assess risks, identify effective controls, and improve cybersecurity culture and practice. It is the second in a series of white papers.

(more available)
Added: October 14, 2018
image from Evolution Of Cloud In Education

Evolution Of Cloud In Education

Vector Consulting was commissioned by Cisco Australia and New Zealand to better understand the role and impact of cloud in higher education and training. For the purposes of this report `cloud’ is predominantly focused on infrastructure as a service or cloud-based infrastructure. The study included desktop research, targeted interviews and a comprehensive survey, which forms the basis for this report. The survey was distributed electronically to Australian and New Zealand institutions to better understand their current views about where cloud was having the most impact and how they were planning for cloud. The survey was in field for two weeks and all individual responses were provided.

(more available)
Added: October 14, 2018
image from GTIC Monthly Threat Report April 2018

GTIC Monthly Threat Report April 2018

This monthly threat report takes a look at the month of April 2018. Specifically it looks at Ransomware and Cryptojacking battling for top threat spot, Russia Nation-State targeting network infrastructure, and supply chain attacks.

(more available)
Added: October 14, 2018
image from How To Keep Cyberattacks In Check

How To Keep Cyberattacks In Check

This small report offers some simple guidelines that can help your organization keep cyberattacks at bay.

Added: October 14, 2018
image from Implications Of Using Privileged Access Management To Enable Next Generation Technology

Implications Of Using Privileged Access Management To Enable Next Generation Technology

To better understand how security issues, such as privileged access management (PAM), affect the adoption of next-generation technologies, BeyondTrust – the leader in PAM – commissioned the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology survey. The results are a wake-up call for anyone looking to leverage these next-generation technologies.

(more available)
Added: October 14, 2018
image from Intent-Based Networking And Extending The Enterprise

Intent-Based Networking And Extending The Enterprise

Cisco provides a brief report that discusses intent based networking and the enterprise.

Added: October 14, 2018
image from Second Annual State of Ransomware Report: US Survey Results

Second Annual State of Ransomware Report: US Survey Results

The title of the article details what it discusses. Ransware attacks caused 22 percent of small to medium size organizations to cease business operations immediately.

(more available)
Added: October 14, 2018
image from Secure The Vote With Zero Trust Security

Secure The Vote With Zero Trust Security

This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers.

Added: October 14, 2018
image from The Definitive Guide To Micro Segmentation

The Definitive Guide To Micro Segmentation

This eBook gives a detailed understanding of Adaptive segmentation and how it can be effectively used for cloud security.

Added: October 14, 2018
image from The Right To Be Forgotten

The Right To Be Forgotten

This paper is intended to support those preparing their organisation for the General Data Protection Regulation (GDPR) and considering what the Right to be Forgotten (RtbF) means for their organisation.

(more available)
Added: October 14, 2018
image from The State Of Endpoint Security Today

The State Of Endpoint Security Today

This paper delivers insights into the prevalent cybersecurity issues facing organizations today: from ransomware to exploits and machine learning, it shares the experiences and future plans of IT managers across the globe. It’s an illuminating read, providing insight into where the field stands on these issues.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 36
  • 37
  • 38
  • 39
  • 40
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)