Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Boundary Defense

Below you will find reports with the tag of “Boundary Defense”

image from Evolution Of Cloud In Education

Evolution Of Cloud In Education

Vector Consulting was commissioned by Cisco Australia and New Zealand to better understand the role and impact of cloud in higher education and training. For the purposes of this report `cloud’ is predominantly focused on infrastructure as a service or cloud-based infrastructure. The study included desktop research, targeted interviews and a comprehensive survey, which forms the basis for this report. The survey was distributed electronically to Australian and New Zealand institutions to better understand their current views about where cloud was having the most impact and how they were planning for cloud. The survey was in field for two weeks and all individual responses were provided.

(more available)
Added: October 14, 2018
image from Mobile Integration Done Right

Mobile Integration Done Right

This paper takes a look at mobile app integration and presents how to do it correctly.

Added: October 14, 2018
image from The Rise of Nation State Attacks

The Rise of Nation State Attacks

The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation state attacks due to an uncertainty as to what a nation state attack is and how to identify the key characteristics, methods and motives of these attacks that originate with foreign governments.

(more available)
Added: October 14, 2018
image from Top Ten DNS Attacks

Top Ten DNS Attacks

This report takes a look at the top ten DNS attacks.

Added: October 14, 2018
image from Under Threat or Compromise

Under Threat or Compromise

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape.

(more available)
Added: October 14, 2018
image from Webroot Threat Report 2017

Webroot Threat Report 2017

The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year.

(more available)
Added: October 14, 2018
image from 2015 Cost of Cyber Crime Study: United States

2015 Cost of Cyber Crime Study: United States

Our goal is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the consequences of an attack.

(more available)
Added: October 13, 2018
image from 6 Important Steps To Evaluating A Web Security Solution

6 Important Steps To Evaluating A Web Security Solution

Six Important Steps to Evaluating a Web Security Solution from EdgeWave®, offers IT professionals a checklist for evaluating Web security vendor solutions. The goal is to help you size up competitive offerings and understand new approaches to the critical problem of protecting your organization from mailcious web sites and inappropriate web use.

(more available)
Added: October 13, 2018
image from CEO Survey:Summary And Key Findings

CEO Survey:Summary And Key Findings

RedSeal polled 200 CEO’s about their confidence in their companies’ cybersecurity posture, and discovered that they are dangerously unrealistic about how vulnerable they are.

(more available)
Added: October 13, 2018
image from CTI in Security Operations:SANS 2018 CyberThreat Intelligence Report

CTI in Security Operations:SANS 2018 CyberThreat Intelligence Report

This is the result of SANS 2018 Cyber Threat Intelligence Survey. The survey focuses on how organizations could collect security intelligence data from a variety of sources, and then recogniza and act up on indicators of attach and compromise scenarious in a timely manner.

(more available)
Added: October 13, 2018
image from Identifying Critical Gaps in Database Security

Identifying Critical Gaps in Database Security

This white paper provides the results of a survey that looked to understand the weaknesses in the current state of database security.

(more available)
Added: October 13, 2018
image from Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions

You’re convinced that protecting privileged accounts is paramount in your security strategy. But how do you go about selecting the right solutions from the right provider? You need a guide to know what to expect, and what to look for as you evaluate potential privileged account security solutions. To help you make informed decisions, the following are seven questions to ask every potential vendor as part of your assessment.

(more available)
Added: October 13, 2018
image from The Guide To Secure Mobile Gateways

The Guide To Secure Mobile Gateways

According to Statcounter, mobile data internet traffic surpassed desktop based traffic for the first time in 2016. With Gartner estimating one-third of all malware coming from mobile devices in 2019 and less than 10% of organizations implementing Mobile Threat Defense solutions1, the threat landscape for mobility is ripe for hackers. Read the report to find out more about how organizations can defend themselves against these threats.

(more available)
Added: October 13, 2018
image from The Healthcare Industry's Resolutions For A Safer 2018

The Healthcare Industry's Resolutions For A Safer 2018

This report takes a look at some of the damages that occurred in the Healthcare Industry, and examines what positive steps can be made in 2018 to make a safer cybersecurity experience for the industry.

(more available)
Added: October 13, 2018
image from Threat Intelligence Executive Report 2017: Volume 4

Threat Intelligence Executive Report 2017: Volume 4

This Threat Report takes a look at some of the events of mid 2017. Specifically, it looks at the global WannaCry and Petya Threats, attacks that bypass filtering, a Chinese threat group, and threat actors stealing intellectual property from Japan.

(more available)
Added: October 13, 2018
image from Top 7 Office 365 Security Use Cases For a CASB 2016

Top 7 Office 365 Security Use Cases For a CASB 2016

This eBook discusses revelant cloud security information for those using Microsoft Office 365

Added: October 13, 2018
image from A Guide To Content Filtering For Mobile

A Guide To Content Filtering For Mobile

This report covers the challenges, trends and benefits of Content Filtering in a mobile-first environment.

Added: October 12, 2018
image from A Technical Solutions Guide For Privileged Password And Session Management Use Cases

A Technical Solutions Guide For Privileged Password And Session Management Use Cases

Despite the number of data breach stories in the news, many IT organizations fall into the easy trap of using shared accounts for users, administrators, or applications. While this practice means that, when access is needed, everyone can easily pitch in to get the work done, it comes with massive, unjustifiable security and compliance tradeoffs. This paper seeks to provide assistance with these situations.

(more available)
Added: October 12, 2018
image from Cyber Threats To The Construction And Engineering Industries

Cyber Threats To The Construction And Engineering Industries

Learn why the construction and engineering sectors are high profile targets for state-sponsored threat actors engaged in cyber espionage.

Added: October 12, 2018
image from Enhanced Threat Awareness Proposition

Enhanced Threat Awareness Proposition

This paper posits that, “A re-classification of vulnerability rules and their respective attack chains derived through log analysis alerts may now be modified and adjusted through big data processing. Analysis and presentation of attack chain data should be supplied to customers and should cover each stage of a compromised asset or attack.”

(more available)
Added: October 12, 2018
image from Network Threat Detection

Network Threat Detection

This report aims to compare the effectiveness of a selection of threat detection appliances. The products were exposed to internet threats that were live during the test period, as well as crafted exploit-based attacks.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)