Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from State of Application Services 2019 Report/ Focus On Americas

State of Application Services 2019 Report/ Focus On Americas

This report from F5 offers insights into key data regarding application services in the Americas.

Added: March 16, 2019
image from Industry Cyber-Exposure Report: ASX 200

Industry Cyber-Exposure Report: ASX 200

Using information from Rapid7’s Project Sonar internet telemetry service, this report reviews several dimensions of demonstrated security controls for companies in the S&P 200 and ASX (Australian) stock indices.

(more available)
Added: March 16, 2019
image from Cybersecurity In The City: Ranking America's Most Insecure Metros

Cybersecurity In The City: Ranking America's Most Insecure Metros

From the report, “To generate this report, Coronet analyzed an enormous set of data comprised of both access and service threats. The data originated from Wi-Fi and cellular networks, devices spanning all operating systems and public network connectivity infrastructure. The data was aggregated and evaluated based on potential damage that could be caused by attackers and existing vulnerabilities in the 55 most populated DMAs, which together account for almost 70 percent of the entire U.S. population. The ranked results have been aggregated into regions which closely resemble Nielsen DMAs. Coronet ranked each city that was analyzed from most insecure to least vulnerable, with the most insecure cities scoring a 6.5 and above.” Read on to find out more.

(more available)
Added: March 16, 2019
image from Smart Cities Cyber Security Worries

Smart Cities Cyber Security Worries

This infographic provides insight into the cyber security worries of Smart Cities.

Added: March 9, 2019
image from Monthly Threat Round-up: September 2017

Monthly Threat Round-up: September 2017

From the report, “Welcome to the Monthly Threat Roundup report for Sept 2017. At Paladion CTAC we continuously track emerging threats and vulnerabilities and provide you timely actionable intelligence to stay safe. We provide threat related IOC for auto-download that can be directly integrated with your security devices. We also provide advisories on how to prevent, detect and respond to latest attacker techniques. This report summarizes the key observations and analysis done by the CTAC team. It also includes insights and analysis related to global threats and incidents of the past month. "

(more available)
Added: March 7, 2019
image from Demystifying Third-Party Vendor Risk Management for Healthcare Organizations

Demystifying Third-Party Vendor Risk Management for Healthcare Organizations

Outsourcing is a fact of life for healthcare organizations, from routine functions such as food services and laundry to regulatory compliance and clinical activities. Large numbers of vendors must be properly managed in order to reduce clinical, financial and regulatory risk. This paper discusses how to reduce complexity in third-party vendor risk management, and how to turn uncertainty and confusion into efficiency and confidence.

(more available)
Added: March 7, 2019
image from What Will The Future of GRC Look Like?

What Will The Future of GRC Look Like?

From the Report, “In this new world, GRC has tremendous opportunity to add value. For instance, by pushing for higher standards of corporate governance and integrity, GRC can help a business strengthen its reputation, and inspire trust. By providing a clear picture of the regulatory landscape, GRC can help the business expand into new markets faster. And by providing timely risk intelligence on new digital technologies, GRC can help the business capitalize on upside opportunities. In short, the future of GRC lies in being an enabler of business growth and performance.”

(more available)
Added: March 6, 2019
image from 2019 Security Report: Welcome To The Future of Cyber Security

2019 Security Report: Welcome To The Future of Cyber Security

From the Report, “This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. We provide an assessment of threat events by organization size and industry, and examine threat incident patterns identified through guidance from security specialists. We also further explore inbound activity to our honeypot network to identify trends and patterns that reveal rising new threats, such as Android Debug Bridge (ADB) activity, the persistence of old threats such as EternalBlue, and the vulnerability posed by non-novel credentials as revealed to publicly exposed systems. The report concludes with five steps you can take to bolster your organization’s security posture in 2019 and beyond, based on our findings.”

(more available)
Added: March 6, 2019
image from GRC 2019: The Known Unkowns

GRC 2019: The Known Unkowns

“The future of GRC will not just be about managing known risks or monitoring compliance. It will be about sustaining an organization’s social license to operate.”

(more available)
Added: March 6, 2019
image from Anticipating The Unkowns: Chief Information Security Officer (CISO) Benchmark Study

Anticipating The Unkowns: Chief Information Security Officer (CISO) Benchmark Study

This report reveals findings around the cybersecurity landscape. To inform this report they surveyed ,3,200 security leaders asking questions in three categories, Set Up - how do you set yourself up for success, Architecture - what is your approach to vender/solution selection, and finally Breach Readiness and Response.

(more available)
Added: March 6, 2019
image from DevSecOps Community Survey 2019

DevSecOps Community Survey 2019

“Our 6th annual DevSecOps community survey, represents the voice of 5,558 IT professionals and demonstrates that DevOps practices are maturing rapidly, security is being automated earlier in the development lifecycle, and management of software supply chains is a critical differentiator. "

(more available)
Added: March 6, 2019
image from Microsoft Security Intelligence Report

Microsoft Security Intelligence Report

From The Report, “What you’re reading are insights culled from a year of security data analysis and hands-on lessons learned. Data analyzed includes the 6.5 trillion threat signals that go through the Microsoft cloud every day and the research and realworld experiences from our thousands of security researchers and responders around the world. In 2018, attackers used a variety of dirty tricks, both new (coin mining) and old (phishing), in their ongoing quest to steal data and resources from customers and organizations. Hybrid attacks, like the Ursnif campaign, blended social and technical approaches. As defenders got smarter against ransomware, a loud and disruptive form of attack, criminals pivoted to the more “stealth”, but still profitable, coin-miners.”

(more available)
Added: March 1, 2019
image from The Six Inconvenient Truths of Data-Centric Security (and What to Do About Them)

The Six Inconvenient Truths of Data-Centric Security (and What to Do About Them)

According to IDC’s 2018 Data Services for Hybrid Cloud Survey: » 65% of enterprise IT security, line-of-business IT, and data management specialists cited a medium to robust digital rights management deployment in their organization. » Organizations are struggling to secure data across multi-cloud and hybrid environments. More than 37% of survey respondents indicated that the growing complexity of security solutions is a significant challenge that often impedes data governance policy enforcement.

(more available)
Added: March 1, 2019
image from Oracle and KPMG Cloud Threat Report 2019

Oracle and KPMG Cloud Threat Report 2019

This report examines emerging cyber security challenges and risks that businesses are facing as they embrace cloud services at an accelerating pace. The report provides leaders around the globe and across industries with important insights and recommendations for how they can ensure that cyber security is a critical business enabler. Cyber security leaders and practitioners can use this report to educate lines of business about the real security risks the cloud can present.

(more available)
Added: March 1, 2019
image from Building Trust In The Cloud: Overcoming Cybersecurity Concerns To Reap Cloud's Benefits

Building Trust In The Cloud: Overcoming Cybersecurity Concerns To Reap Cloud's Benefits

The HIMSS Media survey, Cloud Security Insights, sponsored by the Center for Connected Medicine, sought to better understand attitudes and perceptions about cloud security among hospitals and health systems. It’s findings: among the IT, cybersecurity and informatics professionals surveyed, more than half cited cybersecurity concerns as “significantly limiting” their use of cloud services.

(more available)
Added: March 1, 2019
image from The State Of Cloud Cybersecurity in Health Care

The State Of Cloud Cybersecurity in Health Care

This is the infographic that reveals the key information revealed in the report of the same name.

Added: March 1, 2019
image from Beginner's Guide to Brute Force & DDoS Attacks

Beginner's Guide to Brute Force & DDoS Attacks

This report offers advice for what to do when the barbarians are at your door…

Added: February 27, 2019
image from 2019 Cyber Security Risk Report

2019 Cyber Security Risk Report

Aon’s Cyber Solutions explores eight specific risks that organizations may face in 2019 no matter where they are on their digital journey.

(more available)
Added: February 27, 2019
image from 2018 State Of The Firewall

2018 State Of The Firewall

The data in this survey suggests that the role of the firewall in network security remains critical even as the network security landscape undergoes significant evolution and expansion. Within the enterprise, organizational and departmental roles and responsibilities with respect to network security in the new technology landscape remain in flux. At the same time, parameters that bound traditional definitions of ‘firewall’ are subject to change as emerging platforms and devices acquire characteristics that were previously in the domain of traditional firewalls. The totality of this complexity overlays and exacerbates pre-existing challenges in managing firewalls rules and protocols and points to the need for innovative solutions to reign in complexity and ease the burdens on overextended network security professionals.

(more available)
Added: February 18, 2019
image from The 2017 State Of The Firewall

The 2017 State Of The Firewall

FireMon is proud to present its 3rd Annual State of the Firewall Report based on 437 survey responses collected between November 16, 2016 and December 6, 2016. Respondents included IT security practitioners representing a range of professional roles, organization sizes and industry verticals. Survey participants were asked 26 questions about their current firewall infrastructure and management challenges as well as questions about adoption and impact of emerging technologies such as SDN, cloud, microsegmentation and Internet of Things (IoT).

(more available)
Added: February 18, 2019
image from 2016 State of the Firewall Report

2016 State of the Firewall Report

FireMon is proud to present its 2nd Annual State of the Firewall Report based on a November 2015 survey of 600 IT security practitioners, representing a range of professional roles, organization sizes and industry verticals. Survey participants were asked 21 questions about their current firewall infrastructure and management challenges as well as questions about adoption and impact of emerging technologies such as NGFW, SDN and cloud. When compared with results from the 2015 study, the responses revealed three trends that this report will explore further: 1) Firewalls remain an extremely valuable part of the network security infrastructure; 2) Next-generation firewalls continue to see broad adoption, adding complexity to security management; and 3) Awareness around SDN and its impact on network security has increased.

(more available)
Added: February 18, 2019
  • ««
  • «
  • 15
  • 16
  • 17
  • 18
  • 19
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 14, 2025 12:08 UTC (build b1d7be4)