Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of how mobile app security can be achieved through the technique of code injection.

(more available)
Added: October 24, 2018
image from Securing Information In The Age Of Collaboration

Securing Information In The Age Of Collaboration

This report presents the results of a survey run by ESG and commissioned by Seclore. They analyze information related to data, data security, and collaboration.

(more available)
Added: October 24, 2018
image from Securing The Modern Distributed Enterprise

Securing The Modern Distributed Enterprise

In this report they take a deeper look at the complexities of securing an organization and the role of digital transformation.

(more available)
Added: October 24, 2018
image from The Continuum Of Cloud Native Topologies

The Continuum Of Cloud Native Topologies

This report gives a clever way to understand Cloud security topologies. It breaks all of the concepts down into a simple continuum.

(more available)
Added: October 24, 2018
image from The Internet Is Broken

The Internet Is Broken

With the subtitle “Why Internet Routing Sucks” you know this will be an interesting read.

Added: October 24, 2018
image from The Internet Of Things Requires A Security Rethink

The Internet Of Things Requires A Security Rethink

This paper takes a good look at the new era that is being ushered in by the Internet Of Things. It discusses the “perfect storm” that is being created by the issues and innovations ahead.

(more available)
Added: October 24, 2018
image from The Powers Of Identity Governance And Privileged Access Security

The Powers Of Identity Governance And Privileged Access Security

This eBook provides information based on a 2017 survey that reveals the power of identity governance and privileged access security.

(more available)
Added: October 24, 2018
image from Web Application Firewalls:Securing Modern Web Applications

Web Application Firewalls:Securing Modern Web Applications

This report is intended to help you get up to speed on the latest developments in the WAF space, to better understand how you can incorporate and integrate WAF technology with your existing and planned technology deployments, including cloud, on-premises, and hybrid topologies.

(more available)
Added: October 24, 2018
image from Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

This book takes a look at “whaling” scams. Or largescale phishing attacks. It offers some analysis and insight into how these scams can be avoided.

(more available)
Added: October 24, 2018
image from 2016 Threat Predictions

2016 Threat Predictions

This report deals with predicting the cyber threat landscape for 2016 through 2020. It does this by looking back 5 years, and analyzing the past, and also talking to folks who make predictions for the 5 years in the future.

(more available)
Added: October 23, 2018
image from 2018 Cloud Security Report

2018 Cloud Security Report

Offering insight into a variety of issues related to cloud security, this report discusses several key issues, including, the biggest threats to cloud security, legacy security tools that do not work in the cloud, and the growth of cloud security budgets.

(more available)
Added: October 23, 2018
image from 2018 Security Report

2018 Security Report

This report takes a look at 5 key trends that are shaping IT security practices, with findings that provide insight into customer challenges, threat actor behavior, and the global threat landscape.

(more available)
Added: October 23, 2018
image from 6 Principles For DevOps Security At Scale

6 Principles For DevOps Security At Scale

DevOps and security leaders recognize that DevOps requires a fresh approach to security that mitigates risk and uncertainty without impairing velocity. This e-book presents six guiding principles for enabling DevOps security at scale.

(more available)
Added: October 23, 2018
image from Annual Ransomware Report 2017

Annual Ransomware Report 2017

Druva conducted its annual ransomware survey to better understand what impact ransomware has had on organizations, how they have responded to breaches, and what their outlook is regarding the future of these types of malware attacks.

(more available)
Added: October 23, 2018
image from Breaking Down The Complexity Of Retail Security

Breaking Down The Complexity Of Retail Security

This report takes a look at retail security. It discusses the challenges, and options available to help solve some of the problems involved in defending retail markets.

(more available)
Added: October 23, 2018
image from Cloud Hard 2018 Security With A Vengeance

Cloud Hard 2018 Security With A Vengeance

In partnership with the Information Security Community, Bitglass surveyed over 570 cybersecurity and IT professionals to learn how organizations are approaching cloud security. Read on to learn about the state of traditional tools, security measures IT leaders are taking, and cloud priorities for 2018.

(more available)
Added: October 23, 2018
image from Custom Applications and laaS Trends 2017

Custom Applications and laaS Trends 2017

“Enterprises rely on custom applications to perform business-critical functions. Any downtime could halt operations. Our survey found that while enterprises have confidence in the security of IaaS providers’ underlying infrastructure compared with their own datacenters, data in custom applications is exposed to a wide range of threats independent of the platform. That includes accounts compromised by third parties—via phishing or another method. There are a growing number of examples such as Code Spaces where attackers have held data ransom and in some cases permanently deleted enterprise data in these applications. This report summarizes the scale of custom applications deployed today, where they are deployed, how they are secured, and who is responsible for securing them.”

(more available)
Added: October 23, 2018
image from Cybersecurity Preparedness and Response

Cybersecurity Preparedness and Response

This is a report based on a collaborative survey. Taken as a whole, there continues to be low hanging vulnerabilities which are not addressed in the middle market space. This survey is meant to highlight some of these vulnerabilities and provide risk professionals with a tool to help mitigate both privacy and security risk.

(more available)
Added: October 23, 2018
image from EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

This report uniquely addresses SecOps initiatives in terms of role, team leadership, success rates, company size, vertical adoptions, and geography. It provides telling insights into technology priorities, process, and best practices and metrics for critical use cases—including integrated security/ compliance for performance and availability management, change and configuration management, and IT asset management and audits. The report also addresses how cloud, agile, digital transformation, and mobile all impact SecOps directions.

(more available)
Added: October 23, 2018
image from Global Cloud Data Security Report Q1 2015

Global Cloud Data Security Report Q1 2015

From the report, “CipherCloud enables organizations to embrace cloud applications by protecting critical data going into the cloud. This approach has been adopted by millions of users in multiple industries, such as healthcare, banking and finance, telecommunications and government, across the globe. This report gathers insight from CipherCloud’s installed base and provides analysis on how enterprises approach cloud security and data protection.”

(more available)
Added: October 23, 2018
image from Is Data The New Endpoint

Is Data The New Endpoint

This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured.

(more available)
Added: October 23, 2018
  • ««
  • «
  • 23
  • 24
  • 25
  • 26
  • 27
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 16:08 UTC (build b1d7be4)