Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from Spies In The Enterprise

Spies In The Enterprise

Bitglass reports on the results of their survey regarding how cybersecurity teams are mitigating various threats in the cloud.

Added: October 13, 2018
image from The Cloud Threat Funnel: Suspicious User Behavior That Matters

The Cloud Threat Funnel: Suspicious User Behavior That Matters

For this cybersecurity report, the Cloudlock CyberLab analyzed daily behavior across 10 million users, 1 billion files, and 101,000 apps to surface insightful trends and help organizations detect signs of threat. On the following pages, we’ll walk you through the CyberLab’s Cloud Threat Funnel, designed to help security teams narrow their focus onto user activities that are the most indicative of true threat.

(more available)
Added: October 13, 2018
image from The Healthcare Industry's Resolutions For A Safer 2018

The Healthcare Industry's Resolutions For A Safer 2018

This report takes a look at some of the damages that occurred in the Healthcare Industry, and examines what positive steps can be made in 2018 to make a safer cybersecurity experience for the industry.

(more available)
Added: October 13, 2018
image from Top 7 Office 365 Security Use Cases For a CASB 2016

Top 7 Office 365 Security Use Cases For a CASB 2016

This eBook discusses revelant cloud security information for those using Microsoft Office 365

Added: October 13, 2018
image from Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

The ever-changing cyber threat environment is forcing IT decision-makers (ITDMs) to re- evaluate their security strategies. How well equipped are SMBs to protect their data? How are they adapting their approaches to keep pace with a barrage of new cyber threats? To find out, Webroot commissioned a study of ITDMs in the US, UK, and Australia to evaluate the current security concerns and strategies of SMBs around the world. This report discusses the results of that survey.

(more available)
Added: October 13, 2018
image from Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Connected cars are facing four fundamnetal challenges that need to be overcome. See what these automotive Ethernet industry challenges are and the solutions that are available to help overcome several of the challenges.

(more available)
Added: October 13, 2018
image from 2016 Global Cyersecurity Assurance Report Card

2016 Global Cyersecurity Assurance Report Card

“The objective of this inaugural Tenable Network Security research study is to measure how enterprise IT security professionals view their organization’s ability to assess cybersecurity risks and to mitigate threats that can exploit those risks. In doing so, Tenable has developed the industry’s first Global Cybersecurity Assurance Report Card, which assigns indices and grades to responding organizations globally, by country, and by industry based on the responses of the security practitioners themselves.”

(more available)
Added: October 12, 2018
image from 2016 State of Application Survey:Skills, Configurations, and Components

2016 State of Application Survey:Skills, Configurations, and Components

From the report, “Application security (AppSec) is maturing for most organizations, according to the 475 respondents who took the SANS 2016 State of Application Security survey. In it, respondents recognize the need for AppSec programs and are working to improve them, despite a lack of the necessary skills, lack of funding and management buy-in, and silos between departments hampering their AppSec programs.”

(more available)
Added: October 12, 2018
image from A Guide To Content Filtering For Mobile

A Guide To Content Filtering For Mobile

This report covers the challenges, trends and benefits of Content Filtering in a mobile-first environment.

Added: October 12, 2018
image from Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

This paper presents the results of a survey conducted in Australia to understand how prepared companies were for cyber breach situations, and compliance.

(more available)
Added: October 12, 2018
image from Best Practices For Protecting Your Data When Employees Leave Your Company

Best Practices For Protecting Your Data When Employees Leave Your Company

When employees leave a company, whether voluntarily or involuntarily, it is quite common for them to take sensitive and confidential data with them. This paper examines this problem in detail and provides solutions for employers to mitigate the risks.

(more available)
Added: October 12, 2018
image from Cloud Security Trends: May 2017

Cloud Security Trends: May 2017

This is a report on cloud security trends.

Added: October 12, 2018
image from Crowdstrike Endpoint Strategies White Paper

Crowdstrike Endpoint Strategies White Paper

This whitepaper tries to outline a new standard of response to endpoint security.

Added: October 12, 2018
image from Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

In this report the authors provide insight into the importance of data security.

Added: October 12, 2018
image from Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

This Case Study looks at an example of how the app Pokemon Go, caused the compromise of sensitive corporate data.

(more available)
Added: October 12, 2018
image from Enhanced Threat Awareness Proposition

Enhanced Threat Awareness Proposition

This paper posits that, “A re-classification of vulnerability rules and their respective attack chains derived through log analysis alerts may now be modified and adjusted through big data processing. Analysis and presentation of attack chain data should be supplied to customers and should cover each stage of a compromised asset or attack.”

(more available)
Added: October 12, 2018
image from GDPR Friend Or Foe

GDPR Friend Or Foe

This white paper the explore the GDPR. The consequences of non-compliance, and how an organization can use the GDPR to re-examine and upgrade their security posture.

(more available)
Added: October 12, 2018
image from GDPR White Paper

GDPR White Paper

This paper takes a good and definitive look at the GDPR.

Added: October 12, 2018
image from Key Findings from The Global State of Information Security Survey 2016

Key Findings from The Global State of Information Security Survey 2016

This report is discussing the rising trend of organizations properly prioritizing the risks and dangers of cyber threats.

Added: October 12, 2018
image from NANHAISHU:RATing The South China Sea

NANHAISHU:RATing The South China Sea

This whitepaper details a malicious program identified as NanHaiShu. Based on analysis, the threat actor behind this malware targets government and private-sector organizations. Notable targets of the malware include the Department of Justice of the Philippines, the organizers of the Asia-Pacific Economic Cooperation (APEC) Summit and a major international law firm.

(more available)
Added: October 12, 2018
image from Network Threat Detection

Network Threat Detection

This report aims to compare the effectiveness of a selection of threat detection appliances. The products were exposed to internet threats that were live during the test period, as well as crafted exploit-based attacks.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 34
  • 35
  • 36
  • 37
  • 38
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 04:08 UTC (build b1d7be4)