Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Credentials

Below you will find reports with the tag of “Credentials”

image from How Much Is the Data on Your Mobile Device Worth?

How Much Is the Data on Your Mobile Device Worth?

The purpose of this research, sponsored by Lookout, is to understand the value of the data we access and store on our mobile devices and if we are doing enough to protect that data.

(more available)
Added: October 26, 2018
image from Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Given that the most important information resides in databases, organizations are increasingly turning their focus toward databases security technologies. To defend databases from attackers using stolen credentials, the industry is beginning to adopt a new security paradigm based on machine learning and behavior analysis. This white paper discusses that paradigm shift and the issues that go along with it.

(more available)
Added: October 26, 2018
image from Industry Threat Report: Healthcare

Industry Threat Report: Healthcare

This report was produced with a goal of raising awareness and educating senior decision makers about the cybersecurity issues facing the healthcare industry.

(more available)
Added: October 26, 2018
image from Internet Security Report Quarter 1

Internet Security Report Quarter 1

Have you ever wondered what 0 types of cyber attacks affect small to midsize businesses (SMBs) and distributed enterprises (DEs)? Well, you’ve come to the right place.

(more available)
Added: October 26, 2018
image from Microsoft Security Intelligence Report Volume 22

Microsoft Security Intelligence Report Volume 22

This is the 22nd edition of the Microsoft Security Intelligence Report. In this report, they have organized data sets into two categories, cloud and endpoint. They are sharing data about a shorter time period, one quarter.

(more available)
Added: October 26, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

This Quarterly report continues Rapid7’s excellent work of providing insight to the threats they have witnessed during the 2nd Quarter of 2018.

(more available)
Added: October 26, 2018
image from Securing The Enterprise's Cloud Workloads On Microsoft Azure

Securing The Enterprise's Cloud Workloads On Microsoft Azure

This paper seeks to help organizations understand that Microsoft Azure (Azure) has a lot more to offer than cost savings. Enterprises with the highest levels of cloud adoption, typically, not only completely re-architect their applications, but also take advantage of automation to streamline the entire development and deployment process. They adopt DevOps pipelines and use CI/CD (continuous integration and continuous delivery) tools with the objective of nimbly meeting customer and business needs.

(more available)
Added: October 26, 2018
image from State of Malware

State of Malware

This report discusess malware attacks and data from the year 2016 and makes predictions for 2017.

Added: October 26, 2018
image from State of the Internet Security 4th Quarter 2017

State of the Internet Security 4th Quarter 2017

This is Akamai’s State of The Internet Security report from the fourth quarter of 2017

Added: October 26, 2018
image from Unsecured Firebase Databases: Exposing Sensitive Data Via Thousands Of Mobile Apps

Unsecured Firebase Databases: Exposing Sensitive Data Via Thousands Of Mobile Apps

This report focuses on the Appthority Mobile Threat Team’s latest discovery, a new variant of the HospitalGown vulnerability which occurs when app developers fail to require authentication to a Google Firebase cloud database.

(more available)
Added: October 26, 2018
image from 2015 Centri Data Breach Report

2015 Centri Data Breach Report

This industry report attempts to answer the question: Why are cyberattacks still successful? Along the way it examines the types of problems that enterprises face, common types of attacks, the true cost of data breaches to major organizations and the tools available today to mitigate these threats.

(more available)
Added: October 25, 2018
image from 2015 Trustwave Global Security Report

2015 Trustwave Global Security Report

The writers of this report invite you to use the knowledge contained in this report to become your own master battlefield tactician, by getting to know your enemies in the cyber universe.

(more available)
Added: October 25, 2018
image from 2016 State of SMB Cybersecurity

2016 State of SMB Cybersecurity

This report deals with the state of cybersecurity in small and medium-sized businesses. To develop this research, they surveyed 598 individuals in companies with a headcount from less than 100 to 1,000.

(more available)
Added: October 25, 2018
image from 2018 Incident Response Insights Report

2018 Incident Response Insights Report

This report shares insights and valuable lessons from an examination of the threats in 2017.

Added: October 25, 2018
image from Addressing The Australian Signals Directorate Essential Eight

Addressing The Australian Signals Directorate Essential Eight

In 2017, the Australian Signals Directorate (ASD) updated its list of mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. In this new version, the directorate extended its core policies known as the Top 4 to encompass eight essential mitigation strategies. This paper seeks to provide assistance with privileged access security under these new guidelines.

(more available)
Added: October 25, 2018
image from Avast Data Protection Report 2017

Avast Data Protection Report 2017

This simple little report takes a look at a survey conducted among 11,417 Avast users worldwide, Avast gauged people’s views regarding the value of their data stored in online accounts like email, shopping and social networking sites, and their habits when it comes to protecting their data. The results show that, while many respondents view their data as having actual financial value, they aren’t taking proper measures when affected by a data breach.

(more available)
Added: October 25, 2018
image from BTCWare Ransomware

BTCWare Ransomware

This paper takes a look at a smaller Ransomware family that has not received as much press as the other bigger ransomware families.

(more available)
Added: October 25, 2018
image from Cyber Threats To International Organizations And Non-Profits

Cyber Threats To International Organizations And Non-Profits

Gain insights into the nature and rationales of cyber threats international organizations and nonprofits face.

Added: October 25, 2018
image from How to dramatically improve corporate IT without spending millions

How to dramatically improve corporate IT without spending millions

This research presets a list of vectors commonly used by attackers to compromise internal networks after achieving initial access. It delivers recommendations on how to best address the issues. The goal is to help defenders focus efforts on the most important issues by understanding the attackers’ playbook, thereby maximizing results.

(more available)
Added: October 25, 2018
image from M-Trends 2018

M-Trends 2018

In this report they look at incidents that occurred between October 2016 and September 2017.

Added: October 25, 2018
image from Malware Review 2018

Malware Review 2018

This report takes a look back at 2017 and a look forward to 2018. It focuses specifically on malware attacks.

(more available)
Added: October 25, 2018
  • ««
  • «
  • 15
  • 16
  • 17
  • 18
  • 19
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)