Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from 2017 Security Pressures Report

2017 Security Pressures Report

For ease of consumption, this report is designed into individual sections of “pressures” each featuring insightful context and convenient data tables, with the results compared against last year’s findings as a way of understanding the state of security. In addition, we have broken out the results by country to include the United States, United Kingdom, Canada, Australia, Singapore – and for the first time – Japan. Like in years past, you will find some of the comparison data is particularly intriguing and revealing into the mindset of IT and security professionals based on their region.

(more available)
Added: October 13, 2018
image from 2018 Security Predictions

2018 Security Predictions

In this report, they describe major security shifts we expect in 2018. At the heart of many of these predictions is a requirement to understand the intersection of people, critical data and IP – the human point. By placing behavior and intent at the center of security, security professionals can keep up with technological innovations to come.

(more available)
Added: October 13, 2018
image from 5 Steps To Executing A Mobile Defense Strategy

5 Steps To Executing A Mobile Defense Strategy

This paper provides a simple guide to executing a mobile defense strategy.

Added: October 13, 2018
image from 6 Important Steps To Evaluating A Web Security Solution

6 Important Steps To Evaluating A Web Security Solution

Six Important Steps to Evaluating a Web Security Solution from EdgeWave®, offers IT professionals a checklist for evaluating Web security vendor solutions. The goal is to help you size up competitive offerings and understand new approaches to the critical problem of protecting your organization from mailcious web sites and inappropriate web use.

(more available)
Added: October 13, 2018
image from Android Security: 2015 Year In Review

Android Security: 2015 Year In Review

From the report, “We consider transparency to be critical, so our second annual Android Security Year in Review is intended to share the progress we’ve made with regards to security in the last year, as well as provide our view of the state of security in the Android ecosystem.”

(more available)
Added: October 13, 2018
image from App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

This report seeks to clarify how app-centric security approaches can aid flexibility in a rapidly changing mobile world.

Added: October 13, 2018
image from Businesses At Work

Businesses At Work

Businesses @ Work takes an in-depth look into how organizations and people work today—exploring employees, partners, contractors, and customers, and the apps and services they use to be productive.

(more available)
Added: October 13, 2018
image from Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience.

(more available)
Added: October 13, 2018
image from Choosing A Mobile App Integration Solution

Choosing A Mobile App Integration Solution

This paper seeks to aid the reader with choosing a mobile app integration solution.

Added: October 13, 2018
image from Continuous Monitoring And Compliance In The Cloud

Continuous Monitoring And Compliance In The Cloud

This whitepaper takes a look at the issues of using and implementing continuous monitoring and maintaining government compliance.

Added: October 13, 2018
image from Conversational Office 365 Risk Mitigation: A Conversational Geek Book

Conversational Office 365 Risk Mitigation: A Conversational Geek Book

This ebook provides a casual approach to cloud mitigation. It offers information in a conversational method, allowing for the reader to be able to more effectively communicate with those in his organization who need the information.

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Report

Cybersecurity Insights Report

This research explores the personal impact of online crime. “Our hope is that the findings will move people from general awareness online of the threats to a clearer sense of what’s at risk and why they should care—and take action.”

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

In this report, the authors outline an approach for edge-to-edge security for companies to consider as they build their digital transformation roadmaps. Strengthening a company’s security posture in a world of SDI requires rethinking both the human and the infrastructure elements, leaving behind the idea of network-centric security and moving toward data-centric security.

(more available)
Added: October 13, 2018
image from Data Centric Approach To Endpoint Secuirty

Data Centric Approach To Endpoint Secuirty

This paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the reange of considerations and concrete next steps in the decision-making process.

(more available)
Added: October 13, 2018
image from Duo Security's Two Factor Evaluation Guide

Duo Security's Two Factor Evaluation Guide

This guide provides comprehensive help for enterprises seeking to evaluate two factor authentication services.

Added: October 13, 2018
image from Equifax: A Cautionary Tale

Equifax: A Cautionary Tale

Rather than dismiss the Equifax incident as something that “could never happen to us,” know that it absolutely could. The only way to avoid a devastating breach is through a meticulous prevention strategy and a strong security posture. Once the iceberg’s been hit, the response by employees, investors and even executives will surprise you. Here’s a breakdown of what happened to one of the largest credit agencies on the planet.

(more available)
Added: October 13, 2018
image from Firewall Best Practices To Block Ransomware

Firewall Best Practices To Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job. In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.

(more available)
Added: October 13, 2018
image from Industry 4.0: The World Of Making Is Changing

Industry 4.0: The World Of Making Is Changing

This well designed Report provides excellent articles and insight into the growth of devices and Cyber Security.

Added: October 13, 2018
image from Neustar DDOS Attacks & Protection Report:North America

Neustar DDOS Attacks & Protection Report:North America

Neustar’s 2015 DDoS Attacks and Protection Report spotlights the risks you face, and shows how companies throughout North America are aggressively defending themselves. The major change this year is the significant increase in the use of hybrid solutions (on-premises hardware plus cloud-based mitigation).

(more available)
Added: October 13, 2018
image from Office 365 Survey: An Infographic

Office 365 Survey: An Infographic

This infographic reveals the details of a survey related to the security related issues in organizations that use Office 365,

(more available)
Added: October 13, 2018
image from Quarterly Threat Report:First Quarter 2017

Quarterly Threat Report:First Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they have created additional views by day, hour, and event type by industry to give you a glimpse into both the workload variety and volume facing these unsung heroes of cybersecurity.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 34
  • 35
  • 36
  • 37
  • 38
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 08:08 UTC (build b1d7be4)