Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from Key Findings from The Global State of Information Security Survey 2017

Key Findings from The Global State of Information Security Survey 2017

This initial paper explores how digital organizations are leveraging new technology safeguards to build a cybersecurity and privacy program that jumpstarts success—and creates a truly differentiating business capability.

(more available)
Added: October 23, 2018
image from Mobile Access Optimization And Security For The Cloud Era

Mobile Access Optimization And Security For The Cloud Era

This short e-Book takes a look at the unique problems that are caused by mobile access in the cloud era.

(more available)
Added: October 23, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of various mobile app security methods including per-app VPN, containers, and micro-segmentation.”

(more available)
Added: October 23, 2018
image from Next-Gen Endpoint Risks And Protections: A SANS Survey

Next-Gen Endpoint Risks And Protections: A SANS Survey

This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. Download this survey report to learn other key issues surrounding endpoint protection.

(more available)
Added: October 23, 2018
image from PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

While a data loss incident can be a disaster for an organization’s reputation, there is now a new imperative around inbound information as well. Unwanted data acquisition can create problems just as much as data leaving the organization. There are a couple of scenarios which should be considered. Read this paper to know more.

(more available)
Added: October 23, 2018
image from Security Analytics And Operations In Transition

Security Analytics And Operations In Transition

This report seeks to offer insight into the cybersecurity world and to analyze the dangers and pitfalls of the transition in the profession.

(more available)
Added: October 23, 2018
image from Security In The Golden Age Of Cybercrime

Security In The Golden Age Of Cybercrime

This paper offers insight into an exploration of network cybersecurity in the U.S. Federal Government.

Added: October 23, 2018
image from Six Strategies To Strengthen Your Company's Digital DNA

Six Strategies To Strengthen Your Company's Digital DNA

Digital transformation is a journey, not a destination. And every journey has a starting point. What you do next depends on where you begin. Use this self-assessment to find out where your company is today, then use the associated road map report in this playbook to help chart your course forward.

(more available)
Added: October 23, 2018
image from Sophisticated Phishing Attack Wreaks Havoc

Sophisticated Phishing Attack Wreaks Havoc

This whitepaper follows a specific Phishing attack and details the events that took place.

Added: October 23, 2018
image from Stacking The Odds Against The Fraud

Stacking The Odds Against The Fraud

This paper provides answers for how marketing and fraud can work together to help online gambling operators to win.

Added: October 23, 2018
image from State Of The Channel Ransomware Report

State Of The Channel Ransomware Report

Datto surveyed 1,100 MSPs about ransomware and cybersecurity and published the key findings in this report. We aim to provide the Channel perspective on this growing epidemic and highlight the current prevalence of the malware, its behavior, its target, and its impact within the global small business community. In the end, we’ll provide best practices and solutions for businesses looking to ensure total data protection, business continuity and disaster recovery.

(more available)
Added: October 23, 2018
image from The Digital Business: Creating The Right IT Platform For Digital Transformation

The Digital Business: Creating The Right IT Platform For Digital Transformation

The purpose of this paper is to help CIOs and their boardroom colleagues find the right approach to building a digital infrastructure to achieve the right outcomes for their business.

(more available)
Added: October 23, 2018
image from The ROPEMAKER Email Exploit

The ROPEMAKER Email Exploit

This threat advisory offers insight into the ROPEMAKER Email Exploit.

Added: October 23, 2018
image from The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

This paper takes a look at the best way to prevent breaches, by detecting and mitigating leaks.

Added: October 23, 2018
image from United Endpoint Management: The Next Step In The Evolution Of Device Management

United Endpoint Management: The Next Step In The Evolution Of Device Management

This paper provides a simple summary of Endpoint Management and why it is necessary and helpful.

Added: October 23, 2018
image from 2016 Global Threat Report

2016 Global Threat Report

The Forcepoint 2016 Global Threat Report is a definitive breakdown of many of today’s most impactful cybersecurity threats with far-reaching technical, operational and cost impacts on affected organizations. Each section of this report closes with guidance from the Forcepoint Security Labs team on how to best address the outlined threat(s).

(more available)
Added: October 22, 2018
image from 2017 Security Annual Volume 1

2017 Security Annual Volume 1

This paper was written for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams.

(more available)
Added: October 22, 2018
image from 2017 Security Report

2017 Security Report

This report takes a look at the last 20 years of IT development, and the issues and trends that have taken place in 2017.

(more available)
Added: October 22, 2018
image from 2018 Connectivity Benchmark Report

2018 Connectivity Benchmark Report

This report, which benchmarks how IT decision makers are handling digital transformation, IT operations, and change management, takes an in-depth look at where organizations are on their digital journey and uncovers the challenges they face when integrating new and existing technologies.

(more available)
Added: October 22, 2018
image from 2018 Web Application Security Report

2018 Web Application Security Report

Radware sought the opinions of senior executives and IT professionals responsible for network security at companies with a global reach. What follows is a summary of current global perceptions on the state of application attacks and insights on how to best identify and mitigate threats in the future.

(more available)
Added: October 22, 2018
image from 5G Security Architecture White Paper

5G Security Architecture White Paper

From the report, “We are now seeing the first incarnations of 5G technology. It provides many capabilities that make it a preferred platform for the digitalized world. Solid security is one of the strengths of 4G networks and the same is expected from 5G. This cannot, however, be achieved just by adapting 4G security features to 5G system because the 5G service palette is more than just an extension from that of 4G. Completely new security functionalities and services are needed in addition to enhanced versions of 4G security features.”

(more available)
Added: October 22, 2018
  • ««
  • «
  • 24
  • 25
  • 26
  • 27
  • 28
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 08:09 UTC (build b1d7be4)