Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

BYOD

Below you will find reports with the tag of “BYOD”

image from Cybersecurity Topics: How Employees Impact Cyber Defense

Cybersecurity Topics: How Employees Impact Cyber Defense

This survey looked at company security on the employee level, finding that many employees are not careful with their data.
Added: December 1, 2020
image from Guardians Of The Cloud - 2019 Cloud Security Report

Guardians Of The Cloud - 2019 Cloud Security Report

This paper uses a unique and MARVEL-ous approach to provide insight into maintaining a robust cybersecurity posture in today’s fast-paced world. (more available)
Added: September 18, 2019
image from Replace AV Buyers Guide

Replace AV Buyers Guide

Carbon Black adapts key sections from the SANS Buyer’s Guide for Endpoint Security and provides assistance for helping you assess your options. (more available)
Added: January 1, 2019
image from Healthcare's Most Wired: National Trends 2018

Healthcare's Most Wired: National Trends 2018

Historically, the annual Most Wired research has focused on measuring adoption of healthcare information technology to highlight those organizations with the broadest, deepest IT infrastructure. (more available)
Added: November 21, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. (more available)
Added: October 24, 2018
image from MediaPro Best Practice Series: Battling The Forgetting Curve

MediaPro Best Practice Series: Battling The Forgetting Curve

This paper seeks to provide guidance in understanding the best ways to train employees so that the don’t forget important information. (more available)
Added: October 23, 2018
image from The CIO's Guide To Mobile Threat Defense

The CIO's Guide To Mobile Threat Defense

This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense.
Added: October 23, 2018
image from New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

In August 2017, Cyber adAPT partnered with research and smart data firm Aberdeen Group to conduct a threat detection survey. The results provide critical data and the ability to analyze a variety of detection technology questions and scenarios. (more available)
Added: October 21, 2018
image from An Integrated Approach To IT Troubleshooting

An Integrated Approach To IT Troubleshooting

In this paper, we will share some approaches to monitoring your IT environment and how those approaches impact troubleshooting.
Added: October 17, 2018
image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management. (more available)
Added: October 16, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. (more available)
Added: October 14, 2018
image from Beginner's Guide To Encryption

Beginner's Guide To Encryption

Device Authority’s Beginners’ Guide to Encryption is designed to help you understand the basics of how encryption works, why it matters, and what challenges are facing encryption in the new landscape of the Internet of Things (IoT). (more available)
Added: October 14, 2018
image from Choosing A Mobile App Integration Solution

Choosing A Mobile App Integration Solution

This paper seeks to aid the reader with choosing a mobile app integration solution.
Added: October 13, 2018
© Cyentia Institute 2021
Library updated: February 27, 2021 00:06 UTC (build 7e736b2)