Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from Top Ten DNS Attacks

Top Ten DNS Attacks

This report takes a look at the top ten DNS attacks.

Added: October 14, 2018
image from X-Force Threat Intelligence Index 2017

X-Force Threat Intelligence Index 2017

The Threat Intelligence Index outlines the security threat landscape based on data gathered for the entire year of 2016. It uses data developed by analyzing “billions" of events, monitored by IBM security services, in more than 100 countries.

(more available)
Added: October 14, 2018
image from 2015 Cost of Cyber Crime Study: United States

2015 Cost of Cyber Crime Study: United States

Our goal is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the consequences of an attack.

(more available)
Added: October 13, 2018
image from Conversational Office 365 Risk Mitigation: A Conversational Geek Book

Conversational Office 365 Risk Mitigation: A Conversational Geek Book

This ebook provides a casual approach to cloud mitigation. It offers information in a conversational method, allowing for the reader to be able to more effectively communicate with those in his organization who need the information.

(more available)
Added: October 13, 2018
image from Cyber Attacks: Power Failure Implications

Cyber Attacks: Power Failure Implications

A paper discussing the impact of a cyber attack on the power grid.

Added: October 13, 2018
image from Cyber Threats continue to Escalate

Cyber Threats continue to Escalate

This simple, but effective, infographic displays the trends of cyber threats, impacts and ransomware.

Added: October 13, 2018
image from Cyber Threats To The Education Industry

Cyber Threats To The Education Industry

Understand the cyber threats targeting the education industry, including subsectors impacted by advanced threat groups.

Added: October 13, 2018
image from Duo Security's Two Factor Evaluation Guide

Duo Security's Two Factor Evaluation Guide

This guide provides comprehensive help for enterprises seeking to evaluate two factor authentication services.

Added: October 13, 2018
image from Firewall Best Practices To Block Ransomware

Firewall Best Practices To Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job. In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.

(more available)
Added: October 13, 2018
image from Game Plan for Closing the SecOPS Gap

Game Plan for Closing the SecOPS Gap

Forbes created a new survey. And, from that survey, a common theme emerged from the survey and the one-on-one interviews: today’s enterprises need a modern game plan that uses technology, people and processes to close the SecOps gap.

(more available)
Added: October 13, 2018
image from Industry 4.0: The World Of Making Is Changing

Industry 4.0: The World Of Making Is Changing

This well designed Report provides excellent articles and insight into the growth of devices and Cyber Security.

Added: October 13, 2018
image from Microlearning: Small Bites, Big Cybersecurity Impact

Microlearning: Small Bites, Big Cybersecurity Impact

This whitepaper covers the six things every organization must have to “move the security awareness training” needle.

Added: October 13, 2018
image from Most Companies Unprepared For DNS Attacks

Most Companies Unprepared For DNS Attacks

As such, this survey sought to explore the state of DNS security in the cybersecurity/IT market, discover how highly IT and cybersecurity professionals rank DNS security, and gauge the strength of the DNS protections enterprises have in place.

(more available)
Added: October 13, 2018
image from Neustar DDOS Attacks & Protection Report:North America

Neustar DDOS Attacks & Protection Report:North America

Neustar’s 2015 DDoS Attacks and Protection Report spotlights the risks you face, and shows how companies throughout North America are aggressively defending themselves. The major change this year is the significant increase in the use of hybrid solutions (on-premises hardware plus cloud-based mitigation).

(more available)
Added: October 13, 2018
image from New Ransomware Installers can Infect Computers Without Users Clicking Anything

New Ransomware Installers can Infect Computers Without Users Clicking Anything

Article discussing how ransomware is becoming even more dangerous.

Added: October 13, 2018
image from Ransomware: A Nightmare for Business

Ransomware: A Nightmare for Business

An Infographic created to explain what Ransomware is.

Added: October 13, 2018
image from Ransomware:How To Predict, Prevent, Detect And Respond

Ransomware:How To Predict, Prevent, Detect And Respond

This report asserts that, “Many organizations still follow an outdated approach to cyber security, relying solely on a defensive perimeter to protect their infrastructure.” The report recommends a more robust, iterative approach, which can be broken down into four phases, Predict, Prevent, Detect, and Respond.

(more available)
Added: October 13, 2018
image from Security Response: Dridex Tidal Waves Of Spam Pushing Dangerous Financial Trojan

Security Response: Dridex Tidal Waves Of Spam Pushing Dangerous Financial Trojan

This report takes a look a the Trojan, Dridex.

Added: October 13, 2018
image from State of the Internet Security Web Attacks Summer 2018

State of the Internet Security Web Attacks Summer 2018

From the report, “This quarter, we’re taking a deeper look into the attacks directed against the hospitality industry - including hotel, travel, and airline sites - in an effort to understand why five out of six logins at these sites use fake or stolen credentials. We were surprised to find that many of these login attempts were coming from Russia and China, a departure from the general attack trends.”

(more available)
Added: October 13, 2018
image from The Enterprise Lacks A Big Data Strategy For IoT Transformation

The Enterprise Lacks A Big Data Strategy For IoT Transformation

From the report, “Internet of Things (IoT) technology holds incredible promise for transforming the enterprise, but one of the biggest hurdles for companies implementing IoT will be extracting insight from the incredible volumes of fast-moving data these systems produce and integrating that resulting intelligence into business processes in real time.”

(more available)
Added: October 13, 2018
image from The Healthcare Industry's Resolutions For A Safer 2018

The Healthcare Industry's Resolutions For A Safer 2018

This report takes a look at some of the damages that occurred in the Healthcare Industry, and examines what positive steps can be made in 2018 to make a safer cybersecurity experience for the industry.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 36
  • 37
  • 38
  • 39
  • 40
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)