Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from Understanding And Managing Identity In The Digital Era

Understanding And Managing Identity In The Digital Era

Almost every individual and every business now has a cyberpresence that needs to be secured. Digital transformation has also created a growing supply of security targets in the form of information-rich storehouses of data. Identity and access management (IAM) platforms offer one way to tackle this problem. IAM platforms provide a set of solutions to identify users and control their access within an IT environment. However, modern identity isn’t just about security, privacy, or even convenience. The key value of an identity platform is enablement, in that it allows an organization to securely provide services to end users. It is all “Yes you can … but only you can.”

(more available)
Added: November 24, 2018
image from 9 Questions You Still Have About NIST 800-171 Compliance

9 Questions You Still Have About NIST 800-171 Compliance

This report provides some answers related to NIST 800-171 Compliance.

Added: November 24, 2018
image from Law Firm Cybersecurity Scorecard Q1 2017

Law Firm Cybersecurity Scorecard Q1 2017

The Law Firm Cybersecurity Scorecard is issued quarterly and is part of their commitment to thoroughly study, understand, and report on the imminent amount and magnitude of threats faced by law firms today as well as the steps they are taking to mitigate the threat. To that point, per a recent Law 3603 report, law firm Managing Partners list cybersecurity as their number three priority, behind financial profits and generating revenue. Even though cybersecurity seems to be an area of particular focus, this scorecard will illustrate that law firms continue to struggle with making operational investments and instituting practices that do not provide a quantifiable financial return. Thus, they jeopardize their reputations, client relationships, and in some cases, financial well-being.

(more available)
Added: November 23, 2018
image from A New Era Of Network Attacks: 2018 EfficientIP Global DNS Threat Report

A New Era Of Network Attacks: 2018 EfficientIP Global DNS Threat Report

We live in a new era of network attacks. Increasing frequency and varieties, together with the latest regulations which have global impact, makes 2018 the most important year in recent times for public and private sector organizations.

(more available)
Added: November 23, 2018
image from Cloud Adoption And Risk Report - 2019

Cloud Adoption And Risk Report - 2019

From the Report, “Through analysis of billions of anonymized cloud events across a broad set of enterprise organizations*, we can determine the current state of how the cloud is truly being used, and where our risk lies. Consider that nearly a quarter of data in the cloud is sensitive, and that sharing of sensitive data in the cloud has increased 53% year-over-year. If we don’t appropriately control access and protect our data from threats, we put our enterprises at risk.”

(more available)
Added: November 21, 2018
image from 2019 CIO Agenda: Secure The Foundation For Digital Business

2019 CIO Agenda: Secure The Foundation For Digital Business

The 2019 CIO Survey reveals that digital business is maturing from tentative experiment to application at massive scale. This era of digitalization is focused on long lasting, far-reaching business model changes in most sectors of the economy — changes that hinge not only on technology, but also on your leadership. CIOs, you’re not alone on the journey. This guide compiles key insights and emerging best practices from the 2019 CIO Agenda report to help you: • Compare your views of the future with over 3,000 peers • Learn from top-performing organizations • Refine your strategy for 2019 and beyond so you can move forward with confidence.

(more available)
Added: November 21, 2018
image from CipherCloud Cloud Data Security Research

CipherCloud Cloud Data Security Research

In August 2018 CipherCloud completed a survey of key customers and cloud users that included responses from hundreds of enterprise corporations. This survey was designed to identify the key business drivers that were compelling to these users as justification for the protection of cloud data.

(more available)
Added: November 21, 2018
image from Quarterly Incident Response Threat Report: Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

Quarterly Incident Response Threat Report: Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

A trade war with China. A fragile agreement with North Korea. A growing fear of Russian hackers. Ahead of the 2018 U.S. midterm congressional elections, geopolitical conflict continues to play out in cyberspace.

(more available)
Added: November 21, 2018
image from Cloud Native Security Report: Watching The Honeypots

Cloud Native Security Report: Watching The Honeypots

This report is the first in a bi-annual series that examines risks and attacks in the cloud native computing ecosystem. The next report will be released in the first half of 2019.

(more available)
Added: November 20, 2018
image from Small And Mighty

Small And Mighty

This special report provides a deep dive into the cybersecurity practices of small and midmarket businesses.

Added: November 20, 2018
image from 2019 Forcepoint Cybersecurity Predictions Report

2019 Forcepoint Cybersecurity Predictions Report

In the 2019 Forcepoint Cybersecurity Predictions Report, we explore the impact of businesses putting their trust in cloud providers to protect their data, the impact of end-user trust in those securing personal biometric data, the cascading of trust into the supply chain to protect any critical data in their custodianship, and trust in algorithms and analytics successfully piloting automobiles and alerting security professionals to potential data loss incidents.

(more available)
Added: November 20, 2018
image from Understanding The Pending U.S. Data Breach Prevention and Compensation Act of 2018

Understanding The Pending U.S. Data Breach Prevention and Compensation Act of 2018

This special report provides information related to the Harbinger of a U.S. National Data Protection Law.

Added: November 20, 2018
image from Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

This report offers insight into the Iranian threat agent Greenbug.

Added: November 15, 2018
image from Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society

Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society

This report describes Nile Phish, an ongoing and extensive phishing campaign against Egyptian civil society.

Added: November 12, 2018
image from University Challenge: Cyber Attacks In Higher Education

University Challenge: Cyber Attacks In Higher Education

A report by VMware exploring the evolving threat for UK universities and how they can guard against cyber attacks to preserve their intellectual property

(more available)
Added: November 6, 2018
image from Cybersecurity Realities and Priorities for 2018 and Beyond

Cybersecurity Realities and Priorities for 2018 and Beyond

In late 2017 and early 2018, the Enterprise Strategy Group (ESG) completed a research survey of 413 IT and cybersecurity professionals with knowledge of, or responsibility for, the planning, implementation, and/or operations of their organization’s security policies, processes, or technical safeguards. Survey respondents were in the United States, U.K., and Australia and worked at enterprise organizations (i.e., more than 1,000 employees). Respondents represented numerous industry and government segments, with the largest participation coming from financial services (i.e., banking, securities, insurance, 18%), manufacturing (16%), retail/wholesale (13%), health care (12%), and information technology (10%).

(more available)
Added: November 6, 2018
image from The Machine Identity Crisis

The Machine Identity Crisis

“The use of machines is driving unprecedented improvements in business efficiency, productivity, agility and speed. With businesses increasing their reliance on machines, the number of machines on enterprise networks is growing exponentially. To communicate securely, each machine needs a unique identity to authenticate and secure communications. However, organizations’ abilities to create, manage and protect these machine identities is simply not keeping up with the pace of their evolution. "

(more available)
Added: November 6, 2018
image from (ISC)² CYBERSECURITY WORKFORCE STUDY, 2018: Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens

(ISC)² CYBERSECURITY WORKFORCE STUDY, 2018: Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens

“For the (ISC)² Cybersecurity Workforce Study (formerly the Global Information Security Workforce Study), we talked to cybersecurity pros as well as IT pros who spend at least 25% of their time working on cybersecurity activities. This report explores the findings of that research, illuminating the cybersecurity skills gap by revealing the trends, elements, and impact, all of which can be used to inform the steps organizations and individual cybersecurity pros can take to address this troubling progression.”

(more available)
Added: November 4, 2018
image from 2016 CTAP Threat Landscape Report

2016 CTAP Threat Landscape Report

This report focuses on key metrics from the following verticals: 1) Education 2) Finance & Finance-related Businesses 3) Technology 4) Healthcare Additional data is provided that focuses on company size. In the following pages, we present specific data showing the types of attacks attempted on these networks and other key findings that we believe are of interest.

(more available)
Added: October 26, 2018
image from 2016 Security Pressures Report

2016 Security Pressures Report

A survey of 1,600 IT professionals on the risks being faced by organizations, the common reactions to those concerns, and the challenges with which individuals are struggling.

(more available)
Added: October 26, 2018
image from 2018 Annual Cybersecurity Report

2018 Annual Cybersecurity Report

In the executive summary, this report asks, “What if defenders could see the future?” it then goes on to say that defenders can see what’s on the horizon and many clues are out there and obvious. The entire report seeks to outline ways in which defenders can see the future.

(more available)
Added: October 26, 2018
  • ««
  • «
  • 19
  • 20
  • 21
  • 22
  • 23
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 14, 2025 04:08 UTC (build b1d7be4)