Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from Security Is A Big Data Problem - It Belongs In The Cloud

Security Is A Big Data Problem - It Belongs In The Cloud

This white paper seeks to explore more fully how traditional AV has had its day, and how the principles of big data are now applicable to both detecting and preventing IT security threats.

(more available)
Added: January 1, 2019
image from Replace AV Buyers Guide

Replace AV Buyers Guide

Carbon Black adapts key sections from the SANS Buyer’s Guide for Endpoint Security and provides assistance for helping you assess your options.

(more available)
Added: January 1, 2019
image from Quarterly Incident Response Threat Report: July 2018

Quarterly Incident Response Threat Report: July 2018

This report from July of 2018 discusses China, Russia & North Korea Launching Sophisticated Espionage-Focused Cyberattacks.

Added: January 1, 2019
image from Outsmarting the Smart: Entering The Age of Threat Hunting

Outsmarting the Smart: Entering The Age of Threat Hunting

This report provides insight into threat hunting and the challenge of returning the balance of power for security from the attackers to the defenders.

(more available)
Added: January 1, 2019
image from Cloud Security: From Start Point To End Point

Cloud Security: From Start Point To End Point

This e-book offers insight into the entire subject of Cloud Security.

Added: January 1, 2019
image from Predictive Malware Response Test

Predictive Malware Response Test

SE Labs tested a product from Cylance and sought to discover its weaknesses.

Added: December 29, 2018
image from 2019 Threats Predictions

2019 Threats Predictions

This infographic provides a summarized list of the points made in McAfee’s 2019 threat predictions blog post.

Added: December 29, 2018
image from The Challenge Of Building The Right Security Automation Architecture

The Challenge Of Building The Right Security Automation Architecture

Security automation architecture can improve organizations’ security posture by augmenting or replacing human intervention in the identification and containment of cyber exploits or breaches through the use of such technologies as artificial intelligence, machine learning, analytics and orchestration. Sponsored by Juniper, the purpose of this research is to understand the challenges companies face when deciding how, when and where to implement the right automation capabilities in order to improve productivity, reduce costs, scale to support cloud deployments and ultimately strengthen the security posture of the business. Ponemon Institute surveyed 1,859 IT and IT security practitioners in Germany, France, the United Kingdom and the United States. All participants in this research are in organizations that presently deploy or plan to deploy security automation tools or applications and are familiar with their organizations use of security automation and have some responsibility for evaluating and/or selecting security automation technologies and vendors.

(more available)
Added: December 14, 2018
image from Enterprise Cloud Index 2018 Edition

Enterprise Cloud Index 2018 Edition

In mid-2018, VansonBourne conducted research on behalf of Nutanix to gain insight into enterprise plans for adopting private, hybrid, and public clouds. The respondent base spanned multiple industries, business sizes, and geographies, which included the Americas; Europe, the Middle East, and Africa (EMEA); and AsiaPacific (APJ) regions.

(more available)
Added: December 14, 2018
image from European Technology Index 2018: Is The Era Of The Technology Wild West Over?

European Technology Index 2018: Is The Era Of The Technology Wild West Over?

This is DLA Piper’s fourth Tech Index study into the perceptions and attitudes of European technology growth. As ever, we review how attitudes are changing with regard to market developments, shifts in the financial regulatory landscape and government policies designed to spur business innovation in an increasingly uncertain and disruptive world.

(more available)
Added: December 14, 2018
image from Services Cyber Intrusion Casebook 2018

Services Cyber Intrusion Casebook 2018

In 2018, our global Services team focused resources, intelligence and technology to detect and disrupt future attacks. We’ve analyzed the massive amounts of security data collected from every engagement this year and we’ve gained new insights into what challenges organizations face and how they can better prepare for the next wave of threats. This casebook presents some of the findings and recommendations we’ve made in key engagements across a representative sample of the work we performed last year. We dig into: Emerging and notable trends Examples of ill-prepared organizations and the devastating effects of the breaches they suffered Essential recommendations to prevent companies from becoming another statistic of poor security planning and execution This casebook also underscores the expertise of our team and the important work we’re doing at CrowdStrike® Services. As you read the case studies, you will see that CrowdStrike stands shoulder-to-shoulder with our clients as we work together to stop adversaries and repair damage. But this casebook is not just for CrowdStrike clients — we want everyone to become better prepared to overcome their adversaries in 2019.

(more available)
Added: December 14, 2018
image from Necurs Malware Overview

Necurs Malware Overview

The purpose of this document is to briefly describe the features of Necurs malware. During the analysis, we have been able to identify the different “features” and “capabilities” of the Necurs malware.

(more available)
Added: December 4, 2018
image from The State Of Cloud And Data Protection 2018

The State Of Cloud And Data Protection 2018

This report provides 10 findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption.

Added: November 30, 2018
image from Can Lightning Strike US Elections Twice?: Email Spoofing Threat To The 2018 US Midterm Elections

Can Lightning Strike US Elections Twice?: Email Spoofing Threat To The 2018 US Midterm Elections

As the November 2018 US midterm elections looms, Anomali Labs set forth to answer the cyber version of the old myth “lightning never strikes the same place twice” — replaced with “can email spoofing attacks really strike the US elections twice”. The Anomali research team sought to answer that question by evaluating the strength of email security programs for election-related infrastructure.

(more available)
Added: November 29, 2018
image from The 2018 Identity Report

The 2018 Identity Report

This paper provides information about a comprehensive identity governance strategy. It offers a unique perspective on how an enterprise can gauge their identity strategy, and reduce risk in the organization.

(more available)
Added: November 27, 2018
image from 2018 Market Pulse Survey

2018 Market Pulse Survey

SailPoint’s 2018 Market Pulse Survey found amidst all the change the corporate world is experiencing – digital transformation is top of mind for many organizations – the way people approach security has not changed dramatically. People still have bad habits when it comes to both corporate and personal security, and some are even actively fighting against their organization’s IT department in the search for efficiency. Complicating the situation even more is the development of new threat avenues such as software bots. Read on to learn more.

(more available)
Added: November 27, 2018
image from Biometrics And Privacy: On Device vs On Server matching

Biometrics And Privacy: On Device vs On Server matching

This paper sets out the key privacy implications of processing biometric data in the EU and Switzerland, Canada, USA and the Asia Pacific region (covering Japan, Singapore, Hong Kong and Australia). This paper will touch on legislation and best practice recommendations in these jurisdictions without going into the details of specific laws.

(more available)
Added: November 27, 2018
image from Movement and Modernization: How the Cloud Can Poise Healthcare Organizations for the Future

Movement and Modernization: How the Cloud Can Poise Healthcare Organizations for the Future

The purpose of this white paper is to better understand the challenges that healthcare organizations face as they attempt to modernize efforts in the areas of data collection and analysis, value-based care strategies, and patient and caregiver engagement. This report will discuss how outdated technology investments hamper these efforts— especially as hospitals and other healthcare providers attempt to partner with fellow provider organizations, health information exchanges (HIEs), and accountable care organizations (ACOs) to fully take advantage of the shift to value-based care reimbursements.

(more available)
Added: November 27, 2018
image from Know the game, not just the rules The changing face of cyber security

Know the game, not just the rules The changing face of cyber security

This paper seeks to prompt a discussion about how our mindset and approach to cyber security now needs to change. It proposes 10 areas where important challenges must be confronted; this evolution will also provide some structure for innovative and disruptive technologies that are beginning to come to market but don’t fit the mould of traditional security controls.

(more available)
Added: November 27, 2018
image from CIO'S Guide to Modern Identity

CIO'S Guide to Modern Identity

These days, IAM is a moving target being moved by the forces of cloud, mobile and increasingly connected consumers. By keeping these five trends in mind, and understanding the security and access control needs of your enterprise, you can make decisions that’ll benefit you today, while providing a good foundation for future evolution.

(more available)
Added: November 27, 2018
image from The Clock Is Ticking On Supply Chain Cybersecurity

The Clock Is Ticking On Supply Chain Cybersecurity

More than 40 executive-level representatives from primes to Tier 2 and consultants participated in an October 24th Roundtable on these topics. The roundtable was conducted under Chatham House Rules. Accordingly, this paper summarizes the discussion, with no identification of attendees.

(more available)
Added: November 24, 2018
  • ««
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 14, 2025 04:08 UTC (build b1d7be4)