Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Credentials

Below you will find reports with the tag of “Credentials”

image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. Program research is supported by government agencies, foundations, and the private sector.

(more available)
Added: October 22, 2018
image from Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

This report offers insight into the cyber events of 2015 and makes predictions for 2016 - 2019.

Added: October 22, 2018
image from Multi-Factor Authentication For Dummies

Multi-Factor Authentication For Dummies

This e-book provides a helpful and simple explanation of Multi-Factor Authentication.

Added: October 22, 2018
image from Privileged Access Security For Dummies

Privileged Access Security For Dummies

This is a handy and simple guide for helping individuals understand and implement Privileged Access Security.

Added: October 22, 2018
image from SamSam Ransomware Chooses Its Targets Carefully

SamSam Ransomware Chooses Its Targets Carefully

This report takes a look at the SamSam ransomware. A ransomware that unlike most ransomware, goes after specific organizations.

Added: October 22, 2018
image from Sensitive Data At Risk:The SANS 2017 Data Protection Survey

Sensitive Data At Risk:The SANS 2017 Data Protection Survey

This report is based on a survey that sought to see how organizations were protecting their data.

Added: October 22, 2018
image from Social Engineering:How The Human Factor Puts Your Company At Risk

Social Engineering:How The Human Factor Puts Your Company At Risk

Positive Technologies regularly performs assessment of information security awareness among employees at major companies all over the world. This report provides statis- tics and analysis from 10 most instructive testing projects in 2016 and 2017, including examples of successful attacks against employees. These projects are based on various social engineering techniques and generally included emails, phone conversations, and communication via social networks.

(more available)
Added: October 22, 2018
image from The Five Steps To Managing Third Party Risk

The Five Steps To Managing Third Party Risk

This white paper tackles the subject of how outsourced labor can cause cybersecurity risk.

Added: October 22, 2018
image from Threat Advisory: Ticketac Mobile Apps

Threat Advisory: Ticketac Mobile Apps

This is a threat advisory for Ticketac Mobile Apps

Added: October 22, 2018
image from Three-Part Guide To Developing A BYOD Strategy

Three-Part Guide To Developing A BYOD Strategy

This paper is subtitled “An IT Architect’s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy”

Added: October 22, 2018
image from Tripwire State Of Cyber Hygiene Report 2018

Tripwire State Of Cyber Hygiene Report 2018

This report illustrates how organizations are implementing proper Cyber hygiene, if at all. To gather this data, Tripwire partnered with Dimensional Research, sending a survey to independent sources of IT security professionals. The survey was completed by 306 participants in July 2018, all of whom are responsible for IT security at companies with more than 100 employees.

(more available)
Added: October 22, 2018
image from Unlocking B2B SaaS Growth With Identity Management

Unlocking B2B SaaS Growth With Identity Management

SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.

(more available)
Added: October 22, 2018
image from Whitepaper: Legislation And The Impact On Data Privacy

Whitepaper: Legislation And The Impact On Data Privacy

From the paper, “In March 2017, the expectation of privacy while surfing the internet disappeared in the United States. Congress voted to eliminate the broadband privacy rules that required internet service providers (ISPs) to get explicit consent from consumers before selling or sharing web browsing data and other private information to third parties. With no rules in place to protect personal or corporate web browsing data, there are a few proactive steps to take to help safeguard this information.”

(more available)
Added: October 22, 2018
image from Application Security Statistics Report 2017

Application Security Statistics Report 2017

This is the 12th annual WhiteHat Security Statistics Report. This year they’ve added some real metrics around DevSecOps. They’ve also added a new SAST section and a mobile security section.

(more available)
Added: October 21, 2018
image from Banking On The Customer To Make Open Banking A Success

Banking On The Customer To Make Open Banking A Success

This paper offers a unqiue look into the complications surrounding that adoption of compliant banking solutions. It seeks to help create simple but compliant solutions that customers accept.

(more available)
Added: October 21, 2018
image from Cybersecurity: Labor Market Analysis And Statewide Survey Results

Cybersecurity: Labor Market Analysis And Statewide Survey Results

This report takes a look at the labor market in California, specifically as it relates to Cybersecurity. It offers insight into the growing need for more cybersecurity employees, as well as educational changes that can be made to fill the void.

(more available)
Added: October 21, 2018
image from Email Encryption Secure File Transfer Best Practice

Email Encryption Secure File Transfer Best Practice

This report provides a discussion about the best practices for Email encryption.

Added: October 21, 2018
image from ENISA Threat Taxonomy: A tool for structuring threat information.pdf

ENISA Threat Taxonomy: A tool for structuring threat information.pdf

The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015. The consolidated threat taxonomy is an initial version: in 2016, ENISA plans to update and expand it with additional details, such as definitions of the various threats mentioned.

(more available)
Added: October 21, 2018
image from Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

The Stuxnet and Ukranian power grid attacks give us clear ideas about how much damage a determined adversary can inflict not only on the business or operation concerned, but also on the general public. This paper takes a look at critical infrastructure attacks.

(more available)
Added: October 21, 2018
image from How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

This paper presents exclusive research into how chat platforms can be abused and become a cyber security weakness.

Added: October 21, 2018
image from How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape

How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape

This blog post discusses cyber crime as it relates to cryptocurrencies and how it is changing the landscape.

Added: October 21, 2018
  • ««
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 12:08 UTC (build b1d7be4)