Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Credentials

Below you will find reports with the tag of “Credentials”

image from 2017 Quarterly Threat Report Q1

2017 Quarterly Threat Report Q1

This report takes a look at the cyber threats that took place in the 1st Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 15, 2018
image from 3 Reasons Your IAM Is Leaking Revenue

3 Reasons Your IAM Is Leaking Revenue

Because Identity Management has different use cases depending on whether you’re using it for consumers, other busi- nesses or your own employees, this paper will outline how adopting an optimized identity management system can help realize revenue.

(more available)
Added: October 15, 2018
image from Consumer Security Risks Survey 2016

Consumer Security Risks Survey 2016

This report discusses four main findings; 1) Consumers are concerned about online threats to the people and things that matter most, 2) The dangers online can have severe consequences for people’s data, 3) Children are also exposed to online threats, 4) People should be more cyber savvy - and protect what matters most - when they are online.

(more available)
Added: October 15, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). This paper both references existing research and expands upon it in later sections.

(more available)
Added: October 15, 2018
image from GTIC Monthly Threat Report December 2017

GTIC Monthly Threat Report December 2017

This monthly threat report takes a look at the month of December 2017. Specifically, it looks at insights into Coinhive, intellectual property theft via Iranian hackers, and North Korea’s new cyberattack tools.

(more available)
Added: October 15, 2018
image from McAfee Labs Threats Report June 2017

McAfee Labs Threats Report June 2017

In this quarterly threats report, they highlight three Key Topics: They broadly examine evasion techniques and how malware authors use them to accomplish their goals. They explore the very interesting topic of steganography in the digital world. They examine Fareit, the most famous password-stealing malware.

(more available)
Added: October 15, 2018
image from Mobile Security Index 2018

Mobile Security Index 2018

This paper discusses what organizations fear and what security measures they are taking to mitigate risks. To find out, they commissioned independent research, surveying more than 600 mobility professionals. The results were eye-opening.

(more available)
Added: October 15, 2018
image from Moving Beyond The Password: Consumers' Views On Authentication

Moving Beyond The Password: Consumers' Views On Authentication

In this research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S. consumers who use online and/or mobile banking in January 2017 to better understand their attitudes toward and understanding of various authentication mechanisms.

(more available)
Added: October 15, 2018
image from Privilege Security For The New Perimeter

Privilege Security For The New Perimeter

Security in an era of next-generation technologies, expanding digital footprints, and widely dispersed user bases requires a comprehensive hybrid approach, delivered through privileged access management (PAM).

(more available)
Added: October 15, 2018
image from Quarterly Threat Report:Third Quarter 2017

Quarterly Threat Report:Third Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they sought to make a less chaotic picture of the events of the 3rd quarter of 2017.

(more available)
Added: October 15, 2018
image from Security Privacy And The Next Generation Workforce

Security Privacy And The Next Generation Workforce

Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace.

(more available)
Added: October 15, 2018
image from Security Response: Insecurity in the Internet of Things

Security Response: Insecurity in the Internet of Things

The Internet of Things is becoming and area of danger for security risks. This paper discusses the cyber security issues related to the internet of things, and discusses how people should be taking action to protect their devices.

(more available)
Added: October 15, 2018
image from Suspected Chinese Syber Espionage Group TEMP.Periscope Targeting U.S. Engineering and Maritime Industries

Suspected Chinese Syber Espionage Group TEMP.Periscope Targeting U.S. Engineering and Maritime Industries

This blog post takes a look at a specific Chinese threat that is impacting Engineering and Maritime corporations.

Added: October 15, 2018
image from Threat Advisory: iCare Leak

Threat Advisory: iCare Leak

This is a threat advisory for iCare Leak

Added: October 15, 2018
image from A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

This special report brought to you by the folks at Symantec, takes a hard look at the security issues that surround smart speakers.

(more available)
Added: October 14, 2018
image from Android Is Ready For The Enterprise

Android Is Ready For The Enterprise

This report offers insight into Android and its use in the modern enterprise.

Added: October 14, 2018
image from Best Practices For Web Application Firewall Management

Best Practices For Web Application Firewall Management

The experts at TrustWave have prepared this report to outline the issues and practices for web application firewall management.

Added: October 14, 2018
image from Business Email Compromise (BEC) Attack Trends Report

Business Email Compromise (BEC) Attack Trends Report

This report is a breakdown of Agari’s experience with Business Email Compromise and attacks.

Added: October 14, 2018
image from CakePHP Security Assessment

CakePHP Security Assessment

This report is based on a study done in 2017 to analyze security issues in CakePHP.

Added: October 14, 2018
image from Cyber Threats To The Energy Industry

Cyber Threats To The Energy Industry

Learn what situations contribute to threat activities towards organizations in the energy industry.

Added: October 14, 2018
image from Data Breach Digest: IoT Calamity, The Panda Monium

Data Breach Digest: IoT Calamity, The Panda Monium

This is a report based on a one man’s experience with IoT security.

Added: October 14, 2018
  • ««
  • «
  • 24
  • 25
  • 26
  • 27
  • 28
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)