Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Recovery

Below you will find reports with the tag of “Data Recovery”

image from Coporate IT Security Risks Special Report Series 2016

Coporate IT Security Risks Special Report Series 2016

In order to find out more about the challenges and threats businesses are encountering, Kaspersky Lab, together with B2B International, has conducted a study entitled Corporate IT Security Risks Survey 2016. We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyber threats.

(more available)
Added: October 20, 2018
image from Global Survey On Internet Security And Trust

Global Survey On Internet Security And Trust

This report is based on a survey that involved over one thousand individuals in twenty four countries.

Added: October 20, 2018
image from Impact vs. Metasplout Pro Efficiency Study

Impact vs. Metasplout Pro Efficiency Study

Under most tested scenarios, Core Impact users can expect a notable reduction in both operator time and total elapsed time when performing common penetration testing tasks. This whitepaper presents the repeatable methodology and testing protocol used in our study.

(more available)
Added: October 20, 2018
image from The Path To Rapid GDPR Compliance

The Path To Rapid GDPR Compliance

This white paper looks at some insights into the journey of reaching compliance with the GDPR and its May 2018 deadline. It seeks to share best practice guidelines for all businesses that have clients in Europe.

(more available)
Added: October 20, 2018
image from Control Business Data Risks Through End User Data Protection And Governance

Control Business Data Risks Through End User Data Protection And Governance

This Technology Spotlight examines the need for increased visibility and control to better manage and mitigate the risk presented by a decentralized corporate data environment.

(more available)
Added: October 19, 2018
image from Data Breach Quick View - 2015 Year End Data Breach Trends

Data Breach Quick View - 2015 Year End Data Breach Trends

This research will take a look at how the ransomware types work, not just from a technological point of view but also from a psychological viewpoint. This report will also look at how these threats evolved, what factors are at play to make ransomware the major problem that it is today, and where ransomware is likely to surface next.

(more available)
Added: October 19, 2018
image from Five Reasons Why You Need Endpoint Backup

Five Reasons Why You Need Endpoint Backup

As its title states, this white paper provides five reasons why you need endpoint backup, specifically a centralized backup service.

(more available)
Added: October 19, 2018
image from Ransomware Survey Infographic

Ransomware Survey Infographic

To get a more complete sense of the impact of ransomware beyond the headlines and statistics, we surveyed IT professionals who have had to deal with it firsthand.

(more available)
Added: October 19, 2018
image from The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed organizations in Germany about their approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 19, 2018
image from Transformational ‘smart cities’: cyber security and resilience

Transformational ‘smart cities’: cyber security and resilience

This report will explore the requirements and challenges of creating a secure, reliable and resilient smart city. It will consider how administrations and the overall city ecosystems will need to provide innovative, resilient ‘smart’ solutions that leverage digital information while protecting against malicious violations, unintentional damage and natural disasters.

(more available)
Added: October 19, 2018
image from 2017 Ransomware Report

2017 Ransomware Report

From The Report, “With global ransomware damages predicted to exceed $5 billion this year, it is no surprise that ransomware is the fastest growing security threat. As this year’s global attacks have made national news, businesses of all sizes have become increasingly aware of the looming ransomware threat and the challenge of staying protected. Infected companies race the clock to minimize data loss, downtime, and reputation damage. With the seemingly endless profitability, anonymity and ease of execution it doesn’t appear cybercriminals will be turning their back on ransomware anytime soon. Companies are right to expect another year filled with attacks and new variants. The question is how can companies block these attacks before ransom is demanded, and their data along with their reputation is put at risk.”

(more available)
Added: October 18, 2018
image from 2018 Malware Forecast

2018 Malware Forecast

In this report, they review malicious activity that SophosLabs analyzed and protected their clients from in 2017. They take that data and project what can be expected from 2018.

(more available)
Added: October 18, 2018
image from 3 Steps To Mitigating Insider Threat Without Slowing Down Users

3 Steps To Mitigating Insider Threat Without Slowing Down Users

The point of this white paper is to teach folks how to leverage endpoint security to spot risk and free their users.

(more available)
Added: October 18, 2018
image from Data Breach QuickView - Mid-Year 2015 Data Breach Trends

Data Breach QuickView - Mid-Year 2015 Data Breach Trends

This annual report offers a quick view of data breach trends for mid-year 2015.

Added: October 18, 2018
image from DDoS Threat Report Q2 2016

DDoS Threat Report Q2 2016

This report takes a look at the DDoS threats that occurred in the second quarter of 2016.

Added: October 18, 2018
image from HIPAA Compliant Containers

HIPAA Compliant Containers

This Technical paper discusses the need for Containers. Containers allow deployment of single-purpose virtual compute instances for processing workloads in the cloud regardless of the operating system used. Care must be taken, however, to ensure that your container strategy, deployment methodology, monitoring protocols, and vulnerability management practices are harmonized in a manner that complies with the HIPAA Security Rule, as well as industry recognized security frameworks such as NIST, ISO, CSF and PCI DSS. Read the Paper to understand more about that issue.

(more available)
Added: October 18, 2018
image from Mobile App Security Program Management Handbook

Mobile App Security Program Management Handbook

From the report, “While I call this document a ‘getting started guide,’ regardless of your program’s maturity I think you’ll find some helpful hints regarding the people, process, and technology that can elevate your mobile app security program to the next level.”

(more available)
Added: October 18, 2018
image from Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

This guide was written as a follow-up to “Monitoring 101.” It seeks to provide further more advanced information about Monitoring, the challenges and the successes that can be had.

(more available)
Added: October 18, 2018
image from SiliVaccine: Inside North Korea's AntiVirus

SiliVaccine: Inside North Korea's AntiVirus

This article provides exclusive insight into North Korea’s Anti-Virus program.

Added: October 18, 2018
image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017.

(more available)
Added: October 18, 2018
image from The Cyber Resilient Organization: Learning to Thrive against Threats

The Cyber Resilient Organization: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed 623 IT and IT security practitioners about their organizations’ approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 08:08 UTC (build b1d7be4)