Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Database

Below you will find reports with the tag of “Database”

image from DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention System (HIPS) of F-Secure’s security products.

(more available)
Added: October 25, 2018
image from H1 2017 Cybersecurity Insights

H1 2017 Cybersecurity Insights

This report is focussed on providing insights based on events in 2017.

Added: October 25, 2018
image from How To Instrument For Adanced Web Application Penetration Testing

How To Instrument For Adanced Web Application Penetration Testing

This technical white paper describes a new approach to identifying your most critical web application vulnerabilities faster and at lower cost.

(more available)
Added: October 25, 2018
image from IBM Pathways For GDPR Readiness

IBM Pathways For GDPR Readiness

This white paper contains IBM’s suggestions for accelerating the process of becoming compliant with Europe’s GDPR.

Added: October 25, 2018
image from Kubernetes Deployment And Security Patterns

Kubernetes Deployment And Security Patterns

This is the 2nd ebook from The New Stack’s series focused on the Kubernetes ecosystem. Unlike the 1st ebook that centered on the state of the Kubernetes ecosystem, this ebook shines a light on answering the question: How well does Kubernetes work in production?

(more available)
Added: October 25, 2018
image from M-Trends 2018

M-Trends 2018

In this report they look at incidents that occurred between October 2016 and September 2017.

Added: October 25, 2018
image from National Exposure Index

National Exposure Index

The term “exposure” can mean many things. In the context of this report, they define “exposure” as offering services that either expose potentially sensitive data over cleartext channels or are widely recognized to be unwise to make available on the internet, such as database systems. They looked for the presence of 30 of the most prevalent TCP services across the internet, tallied up the results and performed cross-country comparisons to produce a National Exposure Index, a ranked aggregation of the results of Rapid7’s internet-wide scans of 16 usually cleartext or highly targeted common services, based on the in-country prevalence of those services.

(more available)
Added: October 25, 2018
image from Retaining The Army's Cyber Expertise

Retaining The Army's Cyber Expertise

In this report, they focus on issues related to retaining cyber soldiers. They use data from the Army’s personnel files to determine how many new soldiers are likely to meet the qualifications for this new MOS, as well as their expected retention rates. Specifically, they apply 17C enlist- ment requirements to all soldiers to determine how many meet the standards. They also use data on civilian occupa- tions to determine the earnings these soldiers are likely to be offered based on their military cyber training. To do this, they use the American Community Survey (ACS) data on all workers in information technology (IT)–related occupations.

(more available)
Added: October 25, 2018
image from Targeted Brand Attacks and Mass Credential Exposures

Targeted Brand Attacks and Mass Credential Exposures

This report helps detail the importance of monitoring suspicious domain registrations to protect a brand from being destroyed by cyber criminals.

(more available)
Added: October 25, 2018
image from The Deserialization Problem

The Deserialization Problem

This paper answers questions about what the deserialization vulnerability is, and what the challenges are to solving it.

Added: October 25, 2018
image from Uber: Security Risks Come Along With Your Ride

Uber: Security Risks Come Along With Your Ride

Appthority analyzed the security risks of the Uber app and its integration with other apps in this quarter’s enterprise mobile threat update. What they found may surprise you.

(more available)
Added: October 25, 2018
image from 2014 Trustwave Global Security Report

2014 Trustwave Global Security Report

Subtitled “Cyber Attacks: Can the Market Respond?”

Added: October 24, 2018
image from 7 Facts Every CISO Needs To Know About Open Source Security

7 Facts Every CISO Needs To Know About Open Source Security

This is an infographic that details things every CISO should know about Open Source Security.

Added: October 24, 2018
image from Cloud Security Trends Report Infographic February 2018

Cloud Security Trends Report Infographic February 2018

This is an infographic that summarizes the Redlock report of the same name.

Added: October 24, 2018
image from Cybersecurity Insights Volume 2: The CEO's Guide To Securing The Internet Of Things

Cybersecurity Insights Volume 2: The CEO's Guide To Securing The Internet Of Things

This report tackles security issues related to the Internet Of Things.

Added: October 24, 2018
image from Database Discovery: Identifying Hidden Risks and Sensitive Data

Database Discovery: Identifying Hidden Risks and Sensitive Data

Keeping track of databases, and the associated data they host, turns out to be a significant challenge. This white paper presents a detailed approach to understanding the difficulties related to database discovery, and some solutions to those problems.

(more available)
Added: October 24, 2018
image from DDoS Trends Report Q4 2016-Q1 2017

DDoS Trends Report Q4 2016-Q1 2017

This report contains observations from DDoS attack attempts in Q4 2016 and Q1 2017, as well as comparisons against previous quarters. The data represents the frequency and sophistication of DDoS attacks that organizations face today.

(more available)
Added: October 24, 2018
image from IoT Security:An IBM Position Paper

IoT Security:An IBM Position Paper

This paper takes a look at how cognitive technologies will impact security in the IoT systems. It addresses a variety of issues related to CIoT and the future that lies ahead.

(more available)
Added: October 24, 2018
image from Is Cyber Risk Systemic?

Is Cyber Risk Systemic?

In this report, they examine the results of a survey that attempted to provide a deeper understanding of the views of the likelihood and impact of a systemic cyber-attack.

(more available)
Added: October 24, 2018
image from National Exposure Index 2017

National Exposure Index 2017

From The Report, “This year, we continue this investigation into the risk of passive eavesdropping and active attack on the internet, and offer insight into the year-over-year changes involving these exposed services.”

(more available)
Added: October 24, 2018
image from Preparing For A Cyber Breach: Forewarned Is Forearmed

Preparing For A Cyber Breach: Forewarned Is Forearmed

This paper will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.

(more available)
Added: October 24, 2018
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 12:08 UTC (build b1d7be4)