Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from 6 Key Use Cases For Securing Your Organizations Cloud Workloads

6 Key Use Cases For Securing Your Organizations Cloud Workloads

This ebook lays out several examples of how to effectively secure your cloud workloads.

Added: October 22, 2018
image from 7 Best Practices For Cybersecurity

7 Best Practices For Cybersecurity

This is a helpful little report that simplifies the best practices for Cybersecurity.

Added: October 22, 2018
image from AWS vs. Azure vs. Google: 10 Ways To Choose The Right DataCloud Center For You

AWS vs. Azure vs. Google: 10 Ways To Choose The Right DataCloud Center For You

This is an e-Book that provides 10 ways to pick the right datacloud center.

Added: October 22, 2018
image from Cloud Adoption and Risk Report 2016 Q4

Cloud Adoption and Risk Report 2016 Q4

In this report, we detail the types of sensitive data stored in cloud services, how that data is shared within organizations and with third parties, and how risky employee behavior can expose data. We also examine the external threats that use the cloud to exfifiltrate sensitive data pilfered from on-premises systems as well as attacks directed at sensitive data stored in cloud services. Finally, we cover general usage trends including the top most widely used cloud services.

(more available)
Added: October 22, 2018
image from Cyber Insurance Survey 2014

Cyber Insurance Survey 2014

This report is laid out as follows: Section I focuses on the current prevalence of cyber security insurance and the policy forms it takes. Section II discusses the current structure of the cyber security market. Section III investigates perceptions of the significance, risks, and challenges of cyber security insurance. Section IV details responding company demographics. Section V describes demographic characteristics of the respondents.

(more available)
Added: October 22, 2018
image from Demand More From Your Enterprise CDN

Demand More From Your Enterprise CDN

This e-book takes a look at what a good CDN should do.

Added: October 22, 2018
image from Five Phishing Predictions 2018

Five Phishing Predictions 2018

This report offers some significant predictions of phishing attacks in 2018.

Added: October 22, 2018
image from GDPR An Action Plan For Cloud Readiness

GDPR An Action Plan For Cloud Readiness

This E-Book discusses ways to become GDPR Compliant.

Added: October 22, 2018
image from Has The Enforcer Become The Enabler?

Has The Enforcer Become The Enabler?

This paper talks about what the next evolution of Data Loss Prevention technology means for business collaboration and productivity.

Added: October 22, 2018
image from Heads In The Cloud: Misconceptions Hindering Enterpise Cloud Adoption

Heads In The Cloud: Misconceptions Hindering Enterpise Cloud Adoption

Almost all (99%) surveyed ITDMs say that there is or was at least one driver for their organization moving to the cloud. But for all the exuberance surrounding cloud and SaaS, the majority (94 percent) of ITDMs interviewed have or have had at least one concern about their organization moving to the cloud, the most common being data privacy (61 percent).

(more available)
Added: October 22, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration.

(more available)
Added: October 22, 2018
image from Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey

Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey

This is a brief playbook that gives a plan for how to get started with cloud security.

Added: October 22, 2018
image from Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology.

(more available)
Added: October 22, 2018
image from Practitioner’s Guide to Building a Security Operations Center (SOC)

Practitioner’s Guide to Building a Security Operations Center (SOC)

This white paper goes into detail about what is needed to build and maintain an SOC, the types of technologies and skillsets required, and advantages of an all-in-one security monitoring platform.

(more available)
Added: October 22, 2018
image from Privileged Access Security For Dummies

Privileged Access Security For Dummies

This is a handy and simple guide for helping individuals understand and implement Privileged Access Security.

Added: October 22, 2018
image from Report Summary: Network Management Megatrends 2016

Report Summary: Network Management Megatrends 2016

This is the fourth megatrends study. For this latest version, they have carried forward a number of ongoing questions and threads that are designed to track how the network management landscape is changing over time. They’ve also included many new questions and queries intended to help us characterize and quantify the very latest technology trends. In particular, new questions were added in this report to begin assessing whether hybrid clouds, advanced analytics, and/or the Internet of Things were having an impact on network management tools and practices.

(more available)
Added: October 22, 2018
image from The Five Steps To Managing Third Party Risk

The Five Steps To Managing Third Party Risk

This white paper tackles the subject of how outsourced labor can cause cybersecurity risk.

Added: October 22, 2018
image from The Security Provisions OF GDPR

The Security Provisions OF GDPR

The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice.

(more available)
Added: October 22, 2018
image from Unlocking B2B SaaS Growth With Identity Management

Unlocking B2B SaaS Growth With Identity Management

SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.

(more available)
Added: October 22, 2018
image from Virtualization's Hidden Traps

Virtualization's Hidden Traps

This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany.

(more available)
Added: October 22, 2018
image from 2017 Cloud Security Report

2017 Cloud Security Report

This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others.

(more available)
Added: October 21, 2018
  • ««
  • «
  • 25
  • 26
  • 27
  • 28
  • 29
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 08:09 UTC (build b1d7be4)