Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Boundary Defense

Below you will find reports with the tag of “Boundary Defense”

image from GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 16, 2018
image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management.

(more available)
Added: October 16, 2018
image from Six Best Practices For Securing Amazon Web Service

Six Best Practices For Securing Amazon Web Service

This paper offers some solutions to the best practices for securing Amazon Web Services.

Added: October 16, 2018
image from The Cyber Readiness of Canadian Organizations

The Cyber Readiness of Canadian Organizations

The purpose of this research is to study how Canadian organizations are responding to cyber security threats and the need to invest in enabling security technologies.

(more available)
Added: October 16, 2018
image from Threat Landscape Report Q2 2017

Threat Landscape Report Q2 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 16, 2018
image from "VPN Filter" Botnet: A Sophoslabs Analysis

"VPN Filter" Botnet: A Sophoslabs Analysis

This report provides a technical investigation of the malicious components involved in the attack that infected over 500,000 routers and network storage devices.

(more available)
Added: October 15, 2018
image from 2017 Global IP Reputation Analysis Report

2017 Global IP Reputation Analysis Report

This report provides a monthly snapshot of analysis and trends of IP Reputation globally.

Added: October 15, 2018
image from Containing Targeted Cyber Attacks: Best Practices For Gaining Control Over The Enterprise Endpoint Environment

Containing Targeted Cyber Attacks: Best Practices For Gaining Control Over The Enterprise Endpoint Environment

This paper dicusses the best pracitices for gaining conrtol over Cyber Attacks and the Incident Response action.

Added: October 15, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). This paper both references existing research and expands upon it in later sections.

(more available)
Added: October 15, 2018
image from GTIC Monthly Threat Report December 2017

GTIC Monthly Threat Report December 2017

This monthly threat report takes a look at the month of December 2017. Specifically, it looks at insights into Coinhive, intellectual property theft via Iranian hackers, and North Korea’s new cyberattack tools.

(more available)
Added: October 15, 2018
image from HTTPS/SSL White Paper

HTTPS/SSL White Paper

For many organizations, dealing with HTTPS traffic is something of a double edge sword. Recent moves to encryption challenge the status quo in terms of organizational oversight. Finding a balance between competing interests will be critical to moving forward, but while present technology limitations hamper those efforts, technological advancements can enhance them.

(more available)
Added: October 15, 2018
image from Leadership Compass: Cloud Access Security Brokers

Leadership Compass: Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

(more available)
Added: October 15, 2018
image from Why K-12 Cybersecurity Involves More Than Just CIPA Compliance

Why K-12 Cybersecurity Involves More Than Just CIPA Compliance

Cybersecurity is one of many considerations teachers now juggle as they seek to get the most out of digital transformation in the classroom. But when the weight of assuring cybersecurity conflicts with the litany of everyday issues that teachers are faced with on campus, enforcing digital best practices often falls by the wayside.

(more available)
Added: October 15, 2018
image from 2017 North America Online Fraud Benchamark Report

2017 North America Online Fraud Benchamark Report

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 14, 2018
image from A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

This special report brought to you by the folks at Symantec, takes a hard look at the security issues that surround smart speakers.

(more available)
Added: October 14, 2018
image from Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware

Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware

This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game.

(more available)
Added: October 14, 2018
image from Best Practices For Web Application Firewall Management

Best Practices For Web Application Firewall Management

The experts at TrustWave have prepared this report to outline the issues and practices for web application firewall management.

Added: October 14, 2018
image from Business Email Compromise (BEC) Attack Trends Report

Business Email Compromise (BEC) Attack Trends Report

This report is a breakdown of Agari’s experience with Business Email Compromise and attacks.

Added: October 14, 2018
image from CakePHP Security Assessment

CakePHP Security Assessment

This report is based on a study done in 2017 to analyze security issues in CakePHP.

Added: October 14, 2018
image from Cyber Threats To The Energy Industry

Cyber Threats To The Energy Industry

Learn what situations contribute to threat activities towards organizations in the energy industry.

Added: October 14, 2018
image from Data Breach Digest: IoT Calamity, The Panda Monium

Data Breach Digest: IoT Calamity, The Panda Monium

This is a report based on a one man’s experience with IoT security.

Added: October 14, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)