Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Credentials

Below you will find reports with the tag of “Credentials”

image from Threat Advisory: Skyscape

Threat Advisory: Skyscape

This is a threat advisory for Skyscape

Added: October 18, 2018
image from Who Moved My Secure Perimeter

Who Moved My Secure Perimeter

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.

(more available)
Added: October 18, 2018
image from 2015 Dell Security Annual Threat Report

2015 Dell Security Annual Threat Report

An annual report on cybersecurity threats in 2015.

Added: October 17, 2018
image from 2017 State Of Privacy Security Awareness

2017 State Of Privacy Security Awareness

This report offers analysis of survey results that sought to understand that the general public knows about privacy and cybersecurity.

(more available)
Added: October 17, 2018
image from 2018 Malware Trends Forecast

2018 Malware Trends Forecast

Barkly offers their insight into the Malware landscape, and what they project will occur in 2018.

Added: October 17, 2018
image from Authentication Survival Guide

Authentication Survival Guide

This book aims to be an accessible starting point for everyone that is starting to work with authentication. In this book, you’ll find a concise review of all the key protocols, formats, concepts and terminology that you’ll likely come across when implementing authentication.

(more available)
Added: October 17, 2018
image from Cyber Threats To The Healthcare And Health Insurance Industries

Cyber Threats To The Healthcare And Health Insurance Industries

Learn about current and impending cyber threats to the healthcare and health insurance industry.

Added: October 17, 2018
image from CyberArk Global Advanced Threat Landscape Report 2018

CyberArk Global Advanced Threat Landscape Report 2018

According to the 11th annual CyberArk Global Advanced Threat Landscape Report, while organizations face diverse, dynamic and increasingly damaging cyber security threats, many remain hamstrung by inertia and uncertainty. This is the third and final installment of the 2018 report, which is the result of responses from 1,300 IT professionals, business leaders, application developers and DevOps practitioners from seven countries.

(more available)
Added: October 17, 2018
image from Data Breach Industry Forecast

Data Breach Industry Forecast

This paper outlines five predictions for the data breach industry in the coming year.

Added: October 17, 2018
image from Internet Of Things Cybersecurity Readiness

Internet Of Things Cybersecurity Readiness

This report provides the results of a unique survey designed to analyze their IoT technologies and the struggles and challenges of providing and preparing for security issues related to thos devices.

(more available)
Added: October 17, 2018
image from Looking ahead: SophosLabs 2017 malware forecast

Looking ahead: SophosLabs 2017 malware forecast

In this report, they review malicious activity SophosLabs analyzed and protected customers against last year and use the findings to paint a picture for 2017.

(more available)
Added: October 17, 2018
image from Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

This paper discusses the security issues related to biometric facial recognition applications.

Added: October 17, 2018
image from OWASP Top 10 2017 A Flash Card Guide

OWASP Top 10 2017 A Flash Card Guide

This is a fun little infographic that provides information on the top threats of 2017.

Added: October 17, 2018
image from Past And Present Of Underground Network Industry

Past And Present Of Underground Network Industry

This document presents the definition, category, means, and examples of the underground network industry, as well as protection measures.

Added: October 17, 2018
image from Payment Security Report 2015

Payment Security Report 2015

This report concerns itself with the standards and practices related to credit and debit card payment options.

Added: October 17, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report October 2016

SecureWorks Threat Intelligence Executive Monthly Report October 2016

This report from October 2016 takes a look at the Mirai botnet, VULNS, breach responses, and some new security initiatives.

(more available)
Added: October 17, 2018
image from State Of Cloud Security 2018

State Of Cloud Security 2018

This paper provides insights into some of the latest cloud practices and technologies enterprise information security practitioners must be aware of as IT and sensitive data extends beyond the traditional corporate perimeter.

(more available)
Added: October 17, 2018
image from Threat Advisory: SkyDemon Mobile Apps & Website

Threat Advisory: SkyDemon Mobile Apps & Website

This is a threat advisory for SkyDemon Mobile Apps & Website.

Added: October 17, 2018
image from Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. This paper will discuss six of the top considerations.

(more available)
Added: October 17, 2018
image from Treacherous 12: Cloud Computing Top Threats In 2016

Treacherous 12: Cloud Computing Top Threats In 2016

While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. The Top Threats working group used these survey results alongside their expertise to craft the final 2016 report.

(more available)
Added: October 17, 2018
image from Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

This paper is exclusively dedicated to the cyber threat, Pawn Storm.

Added: October 17, 2018
  • ««
  • «
  • 22
  • 23
  • 24
  • 25
  • 26
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)