Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from Path To MSSP

Path To MSSP

This whitepaper seeks to provide clarity over what “managed security service provider” status means, and whether customers are even concerned about it.

(more available)
Added: October 19, 2018
image from Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Ever since the new European regulation on the protection of personal data (GDPR) was voted in, businesses have started their countdown to the transition that will take place in May 2018. They now have less than 2 years to comply with the new European regulation and the consequences of its new requirements in terms of data protection: strengthened cybersecurity, liability of data collection entities and new mandatory procedures. For organizations, what this entails now is the need to review their procedures and ensure their regulatory compliance before it starts raining sanctions.This white paper aims to address the question by providing a simplified interpretation of the regulation and practical solutions for a smooth transition.

(more available)
Added: October 19, 2018
image from Preparing For NGAV At Scale

Preparing For NGAV At Scale

This Paper is subtitled “Stopping Attacks In Progress Starts With Asking The Right Questions” The paper tries to discuss and reveal the questions that should be asked.

(more available)
Added: October 19, 2018
image from Securing Health Data In A BYOD World

Securing Health Data In A BYOD World

Health Organizations are increasinly using BYOD to adminster care in their facilities. With this technological advancement comes major security concerns. This paper looks at those issues and discusses what can be done to protect Health Data.

(more available)
Added: October 19, 2018
image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from Security Strategies To Prepare For 5G & IoT

Security Strategies To Prepare For 5G & IoT

In the third quarter of 2017, Heavy Reading, in conjunction with A10 Networks, undertook the creation and execution of a global survey designed to assess cloud, premises, and hybrid network security concerns and evaluate CSPs’ strategies to mitigate the risks of a threat curve on an upward trajectory. The key findings from the survey are documented in this white paper.

(more available)
Added: October 19, 2018
image from Software Asset Management.Next

Software Asset Management.Next

This paper seeks to help organizations understand the future of Software Asset Management.

Added: October 19, 2018
image from Strengthen Your Defenses Against Cybercrime

Strengthen Your Defenses Against Cybercrime

This ebook provides insight based on a survey that sought to understand the state of email cybersecurity.

Added: October 19, 2018
image from The Emotional Side of Virtualization

The Emotional Side of Virtualization

Virtualization is a strategic priority at large companies, and trust plays a crucial role in their choice of cloud service provider and in determining the type of data they store outside company infrastructure, according to a Bitdefender survey of 503 IT decision makers at companies in the US, the UK and Germany with more than 1,000 PCs. Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment, and CIOs have to adapt to the new world. This survey, carried out by iSense Solutions, reveals why companies virtualize, which countries CIOs trust and what kind of data companies care most about.

(more available)
Added: October 19, 2018
image from Top Insider Threat Concerns: Careless Users

Top Insider Threat Concerns: Careless Users

This article discusses three different types of careless users who cause cybersecurity incidents.

Added: October 19, 2018
image from Verisign DDoS Trends Report Q1 2017

Verisign DDoS Trends Report Q1 2017

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services from Jan. 1, 2017 through March 31, 2017 (Q1 2017). It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q1 2017.

(more available)
Added: October 19, 2018
image from 2017 Social Poll Series Report

2017 Social Poll Series Report

This is a report based on a survey that seeks to understand how companies look at cloud security.

Added: October 18, 2018
image from 3 Steps To Mitigating Insider Threat Without Slowing Down Users

3 Steps To Mitigating Insider Threat Without Slowing Down Users

The point of this white paper is to teach folks how to leverage endpoint security to spot risk and free their users.

(more available)
Added: October 18, 2018
image from A Frictionless Automotive Ecosystem

A Frictionless Automotive Ecosystem

The advent of the connected car has thrust the automotive industry into a new competitive arena – that of data-driven services and value. This represents a sea of change for the industry, and the stakes are enormous. Today’s consumers expect to be able to connect to their world any-time from anywhere, including from their cars. This, in turn, is driving the need for auto manufacturers to offer more and more connectivity options. Manufacturers that handle these expectations well stand to build owner loyalty, increase customer touch points and ultimately sell more vehicles. Those that do not take this approach risk sowing disappointment and losing hard-won customers.

(more available)
Added: October 18, 2018
image from Build Vs. Buy: Evaluating Identity Management

Build Vs. Buy: Evaluating Identity Management

Every corporation struggles with the decision to Build or Buy an identity management platform. This report seeks to offer advice to aid in that decision.

(more available)
Added: October 18, 2018
image from CISOs Investigate:Endpoint Security

CISOs Investigate:Endpoint Security

The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven risk and technology decisions.

(more available)
Added: October 18, 2018
image from Control Your Cloud: The Pitfalls Of Shared Cloud Strategies

Control Your Cloud: The Pitfalls Of Shared Cloud Strategies

This takes a look at how not all cloud security options are created equal.

Added: October 18, 2018
image from GDPR Compliancy: A Global Change Is On Its Way

GDPR Compliancy: A Global Change Is On Its Way

In this short article, they provide a quick ability to understand the GDPR and how it will impact the world.

(more available)
Added: October 18, 2018
image from Generations of Machine Learning In Cybersecurity

Generations of Machine Learning In Cybersecurity

In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. In addition, the paper seeks to explain that while a great deal of progress has been made in the evolution of machine learning’s application to cybersecurity challenges, there remains an immense amount of opportunity for innovation and advancement in the field, and they expect the sophistication of applications of machine learning to continue to evolve over time.

(more available)
Added: October 18, 2018
image from HIPAA Compliant Containers

HIPAA Compliant Containers

This Technical paper discusses the need for Containers. Containers allow deployment of single-purpose virtual compute instances for processing workloads in the cloud regardless of the operating system used. Care must be taken, however, to ensure that your container strategy, deployment methodology, monitoring protocols, and vulnerability management practices are harmonized in a manner that complies with the HIPAA Security Rule, as well as industry recognized security frameworks such as NIST, ISO, CSF and PCI DSS. Read the Paper to understand more about that issue.

(more available)
Added: October 18, 2018
image from Mobile Threat Detection Through Machine Learning

Mobile Threat Detection Through Machine Learning

This paper is subtitled “Discover the ideal technology dor detecting unknown, zero-day mobile threats.

Added: October 18, 2018
  • ««
  • «
  • 29
  • 30
  • 31
  • 32
  • 33
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 16:08 UTC (build b1d7be4)