Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Boundary Defense

Below you will find reports with the tag of “Boundary Defense”

image from The CISO's Dilemma: Security Versus Productivity

The CISO's Dilemma: Security Versus Productivity

This study looks at what today’s organizations are doing to prevent endpoint breaches targeting employees, the success of those efforts, and the associated costs that make this whole approach rather frustrating.

(more available)
Added: October 19, 2018
image from 2015 State Of The Phish

2015 State Of The Phish

To provide a clearer idea of where, and how, organizations make themselves most vulnerable to phishing attacks, ThreatSim has prepared this 2015 report, which pools two sources of data: 1) ThreatSim’s anonymous data aggregated across our customer base, involving millions of simulated email phishing. 2) A survey of information technology executives, administrators, and information security professionals.

(more available)
Added: October 18, 2018
image from 2016 Annual Corporate Directors Survey

2016 Annual Corporate Directors Survey

This report details the changes that have taken place in Board governance. It discusses the impact these changes have on security and risk issues in business.

(more available)
Added: October 18, 2018
image from Addressing Mobile Risk: Why Network Traffic Analysis Isn't Enough

Addressing Mobile Risk: Why Network Traffic Analysis Isn't Enough

In this whitepaper, they explain why enterprises need to take a mobile first approach to the security of employees and the data they access and share via apps on their mobile devices. They’ll show you why relying on network traffic analysis alone is insufficient to protect against mobile app threat risk, leaving blind spots that weaken your security posture in an increasingly mobile-centric world.

(more available)
Added: October 18, 2018
image from Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

In this study they characterize the extent to which cyber security incidents, such as those referenced by Verizon in its annual Data Breach Investigations Reports (DBIR), can be predicted based on externally observable prop- erties of an organization’s network.

(more available)
Added: October 18, 2018
image from How To Mitigate Five IT Problems Affecting The Financial Industry

How To Mitigate Five IT Problems Affecting The Financial Industry

Read this whitepaper to see how you can mitigate the following five financial services industry IT challenges. Minimize breaches, reduce cyber theft, use technology to improve network performance, improve compliance, and leverage technology to provide a competitive advantage.

(more available)
Added: October 18, 2018
image from Managing IoT In Higher Education

Managing IoT In Higher Education

This paper examines the struggle that Universities and Campuses have with students and the Interent Of Things.

Added: October 18, 2018
image from State of the Internet Q4 2015 report

State of the Internet Q4 2015 report

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2015, covering Internet connection speeds and broadband adoption metrics as well as trends seen in this data over time. In addition, the report includes insight into the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter, and observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks.

(more available)
Added: October 18, 2018
image from The Economic Impact of Cybercrime and Cyber Espionage

The Economic Impact of Cybercrime and Cyber Espionage

This report seeks to answer the following question, “Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,” or is it what others say is a “rounding error in a fourteen trillion dollar economy?””

(more available)
Added: October 18, 2018
image from The Power To Coerce: Countering Adversaries Without Going To War

The Power To Coerce: Countering Adversaries Without Going To War

With the limits of both hard military power and soft power in mind, we set out to explore the space in between: nonmilitary ways of coercing, deterring, weaken- ing, and punishing those that threaten peace, security, and U.S. inter- ests. This examination was part of a project for the Army Quadren- nial Defense Review Office called Hard Security. This report presents alternate approaches to securing U.S. interests that complement hard security and potentially make it more effective.

(more available)
Added: October 18, 2018
image from Three Considerations For File Quarantine Configuration

Three Considerations For File Quarantine Configuration

Here is a paper that provides simple advice on how to quarantine an infected file to protect other files.

Added: October 18, 2018
image from Understanding And Selecting A Data Loss Prevention Solution

Understanding And Selecting A Data Loss Prevention Solution

This Paper provides the background on DLP, to help you understand the technology, know what to look for in a product or service, and make the best decision for your organization.

(more available)
Added: October 18, 2018
image from 3 Must Have Ways To Analyze Mobile For GDPR Compliance

3 Must Have Ways To Analyze Mobile For GDPR Compliance

This paper seeks to aid organizations with analyzing mobile use and GDPR Compliance.

Added: October 17, 2018
image from Assessing Russian Activities and Intentions in Recent US Elections

Assessing Russian Activities and Intentions in Recent US Elections

This is a declassified version of a highly classified assessment that has been provided to the President and to recipients approved by the President.

(more available)
Added: October 17, 2018
image from Authentication Survival Guide

Authentication Survival Guide

This book aims to be an accessible starting point for everyone that is starting to work with authentication. In this book, you’ll find a concise review of all the key protocols, formats, concepts and terminology that you’ll likely come across when implementing authentication.

(more available)
Added: October 17, 2018
image from Cloud And The Financial Sector: Breaking Down The Barriers To Adoption

Cloud And The Financial Sector: Breaking Down The Barriers To Adoption

This report takes a look at the key factors hindering the adoption of cloud security in the financial sector.

Added: October 17, 2018
image from Threat Landscape Report Q3 2017

Threat Landscape Report Q3 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 17, 2018
image from Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

This small report gives a analysis of DDoS attacks and how they are launched and deployed.

Added: October 17, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

This paper seeks to provide high level and tactical findings that are intended to help you advance the progress of your own DevOps Journey. Some key findings in this report are; the beneficial effects of DevOps go beyond financial results, automation is a key differentiator for organizations, and they delve deep into how an application’s architecture can affect an organization’s ability to develop and deliver software.

(more available)
Added: October 16, 2018
image from An Introduction to Cyber Threat Modelling

An Introduction to Cyber Threat Modelling

This document defines an analytical model of cyber threat intelligence in terms of a threat entity’s goal orientation, the capabilities it uses to pursue its goals and its modus operandi. The model is intended to act as a common guiding template for conducting a cyber threat assessment for use by penetration testers to define a set of realistic and threat-informed cyber attack test scenarios.

(more available)
Added: October 16, 2018
image from Digging Deeper: An In Depth Analysis Of A Fast Flux Network

Digging Deeper: An In Depth Analysis Of A Fast Flux Network

This whitepaper provides some insight into a Fast Flux Network and its ability to deal with attacks.

Added: October 16, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)