Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from Network Attached Security Attacking A Synology NAS

Network Attached Security Attacking A Synology NAS

Network-Attached Storage (NAS) devices are a popular way for people to store and share their photos, videos and documents. Securing these devices is essential as they can contain sensitive information and are often exposed to the Internet. Because Synology is one of the top manufacturers of NAS devices, this paper chose to analyze a Synology DS215j. In doing so it identifies a number of exploitable security flaws. In this paper, they discuss in detail the analysis performed, methodologies used, and vulnerabilities found during the summer of 2015.

(more available)
Added: October 18, 2018
image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017.

(more available)
Added: October 18, 2018
image from Understanding And Selecting A Data Loss Prevention Solution

Understanding And Selecting A Data Loss Prevention Solution

This Paper provides the background on DLP, to help you understand the technology, know what to look for in a product or service, and make the best decision for your organization.

(more available)
Added: October 18, 2018
image from Who Moved My Secure Perimeter

Who Moved My Secure Perimeter

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.

(more available)
Added: October 18, 2018
image from 2017 State Of Privacy Security Awareness

2017 State Of Privacy Security Awareness

This report offers analysis of survey results that sought to understand that the general public knows about privacy and cybersecurity.

(more available)
Added: October 17, 2018
image from 2018 Security Report

2018 Security Report

In this report, we will take a look back over the past year and try to make sense of it. In turn we will realize how the threat landscape, by entering the fifth generation of cyber security, now spans across countries and industries along multiple vectors of network, cloud and mobile and uses state-sponsored technologies to do so. By reviewing recent attacks we can understand, however, how 97% of organizations are not prepared for the fifth generation of cyber attacks. We will then be able to take a closer look at what 2018 may have in store and, most importantly, how best to prepare for it.

(more available)
Added: October 17, 2018
image from A Holistic Approach To Identity Managing For The Internet Of Things

A Holistic Approach To Identity Managing For The Internet Of Things

This whitepaper will introduce this new hierarchy of IoT IdM requirements. It will explain how enterprises and governmental agencies should employ a new generation of Cloud-based IdM solutions that can scale to meet today’s escalating IoT security requirements, and enable organizations to fulfill the promise of today’s connected world.

(more available)
Added: October 17, 2018
image from AI Based Prevention And Detection

AI Based Prevention And Detection

This report discusses the new evolution in Endpoint Security.

Added: October 17, 2018
image from An Integrated Approach To IT Troubleshooting

An Integrated Approach To IT Troubleshooting

In this paper, we will share some approaches to monitoring your IT environment and how those approaches impact troubleshooting.

Added: October 17, 2018
image from Annual Information Security Report 2015

Annual Information Security Report 2015

This “Information Security Report 2015” presents the Fujitsu Group’s information security-related activities.

Added: October 17, 2018
image from Cloud And The Financial Sector: Breaking Down The Barriers To Adoption

Cloud And The Financial Sector: Breaking Down The Barriers To Adoption

This report takes a look at the key factors hindering the adoption of cloud security in the financial sector.

Added: October 17, 2018
image from CyberArk Global Advanced Threat Landscape Report 2018

CyberArk Global Advanced Threat Landscape Report 2018

According to the 11th annual CyberArk Global Advanced Threat Landscape Report, while organizations face diverse, dynamic and increasingly damaging cyber security threats, many remain hamstrung by inertia and uncertainty. This is the third and final installment of the 2018 report, which is the result of responses from 1,300 IT professionals, business leaders, application developers and DevOps practitioners from seven countries.

(more available)
Added: October 17, 2018
image from DDoS Threat Report Q1 2018

DDoS Threat Report Q1 2018

This report takes a look at the DDoS threats that occurred in the first quarter of 2018.

Added: October 17, 2018
image from GTIC Monthly Threat Report January 2018

GTIC Monthly Threat Report January 2018

This monthly threat report takes a look at the month of January 2018. Specifically, it looks at two VULNS, the hacking of nuclear weapons, and the increase in suspected Chinese Cyber activity.

(more available)
Added: October 17, 2018
image from Honeypot InfoGraphic

Honeypot InfoGraphic

Armor created a honeypot for a hypothetical SMB healthcare organization. This infographic provides key findings for the attack traffic the honey pot saw during its operation.

(more available)
Added: October 17, 2018
image from Office 365 Exchange Online: Research Report December 2016

Office 365 Exchange Online: Research Report December 2016

This ebook provides a report on the results of a survey that was conducted to discover information on 4 issues related to Office 365.

(more available)
Added: October 17, 2018
image from RightScale 2018 State Of The Cloud Report

RightScale 2018 State Of The Cloud Report

In January 2018, RightScale conducted its annual State of the Cloud Survey. The survey questioned technical professionals across a broad cross-section of organizations about their adoption of cloud infrastructure. The 997 respondents range from technical executives to managers and practitioners and represent organizations of varying sizes across many industries. Respondents represent companies across the cloud spectrum, including both users (19 percent) and non-users (81 percent) of RightScale solutions. Their answers provide a comprehensive perspective on the state of the cloud today.

(more available)
Added: October 17, 2018
image from State Of Cloud Security 2018

State Of Cloud Security 2018

This paper provides insights into some of the latest cloud practices and technologies enterprise information security practitioners must be aware of as IT and sensitive data extends beyond the traditional corporate perimeter.

(more available)
Added: October 17, 2018
image from State Of Enterprise Resource Planning In Cloud Security

State Of Enterprise Resource Planning In Cloud Security

The main objective of the document is to provide a brief introduction to cloud ERP security. The targeted audience of this document includes IT and management professionals who oversee the business IT assets of their respective organizations.

(more available)
Added: October 17, 2018
image from The Evolution Of Network Access Control

The Evolution Of Network Access Control

This whitepaper discusses the growing network security issues caused by IoT, BYOD, and other issues occuring in cyber technology.

Added: October 17, 2018
image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 30
  • 31
  • 32
  • 33
  • 34
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 16:08 UTC (build b1d7be4)