Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Database

Below you will find reports with the tag of “Database”

image from Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

This guide was written as a follow-up to “Monitoring 101.” It seeks to provide further more advanced information about Monitoring, the challenges and the successes that can be had.

(more available)
Added: October 18, 2018
image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017.

(more available)
Added: October 18, 2018
image from Top 5 Data Security Threats

Top 5 Data Security Threats

This Report takes a look at the top 5 data security threats and analyzes what a company can do about them.

(more available)
Added: October 18, 2018
image from UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

This paper takes a look at the cities of the United Kingdom, and the cyber threats that occurred there.

Added: October 18, 2018
image from Understanding And Selecting A Data Loss Prevention Solution

Understanding And Selecting A Data Loss Prevention Solution

This Paper provides the background on DLP, to help you understand the technology, know what to look for in a product or service, and make the best decision for your organization.

(more available)
Added: October 18, 2018
image from 2018 State Of DevOps Report

2018 State Of DevOps Report

The 2018 State of DevOps Report breaks new ground in an understanding of the DevOps evolutionary journey. They have identified the five distinct stages of DevOps evolution, and the critical practices at each stage that help you achieve success and progress to the next phase of your journey.

(more available)
Added: October 17, 2018
image from Data Protection By Design

Data Protection By Design

This paper provides a brief summary of the necessary preparations for becoming GDPR Compliant

Added: October 17, 2018
image from DDoS Threat Report Q1 2018

DDoS Threat Report Q1 2018

This report takes a look at the DDoS threats that occurred in the first quarter of 2018.

Added: October 17, 2018
image from Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

This paper discusses the security issues related to biometric facial recognition applications.

Added: October 17, 2018
image from OWASP Top 10 2017 A Flash Card Guide

OWASP Top 10 2017 A Flash Card Guide

This is a fun little infographic that provides information on the top threats of 2017.

Added: October 17, 2018
image from The Road To Compliance:Steps For Securing Data To Comply With The GDPR

The Road To Compliance:Steps For Securing Data To Comply With The GDPR

Here is another helpful eBook to provide insight into the GDPR compliance situation.

Added: October 17, 2018
image from What About The Plant Floor: Six Subversive Concerns For Industrial Environments

What About The Plant Floor: Six Subversive Concerns For Industrial Environments

This paper describes six key weaknesses that an adversary can use to undermine a plant’s operation, providing real-life threat details and mitigation options.

(more available)
Added: October 17, 2018
image from 2018 Global Security Report

2018 Global Security Report

This annual report takes a look at the last decade of cyber security issues, including 2017, and provides some insight into the years ahead.

(more available)
Added: October 16, 2018
image from Balancing Security and Accessibility with Compliance in the Healthcare Sector

Balancing Security and Accessibility with Compliance in the Healthcare Sector

This white paper presents some interesting information related to the cybersecurity issues that can occur in the healthcare sector.

Added: October 16, 2018
image from Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

This paper seeks to simplify Cloud security and offers some solutions to the issues that an enterprise might deal with.

(more available)
Added: October 16, 2018
image from Growing Disaster Recovery Needs Change the Role of Data Backup

Growing Disaster Recovery Needs Change the Role of Data Backup

Data protection in the form of backup and recovery remains one of the key tools in a company’s disaster recovery/business continuity toolbox. However, the increasing adoption of cloud-based IT options has also added a new set of challenges for managing and protecting business processes that can extend beyond the datacenter. There’s an increasing need for contingency plans that address the potential loss of mission-critical services, as well as the applications and data itself.

(more available)
Added: October 16, 2018
image from Malware Defense Through Collaborative Filtering

Malware Defense Through Collaborative Filtering

This report discusses the malware situation, and how collaborative filtering can offer a solid defense against it.

Added: October 16, 2018
image from The Busy Manager's Guide To Open Security

The Busy Manager's Guide To Open Security

Following the Equifax hack, this document is a guide to help your organization protect their Open-Source information.

Added: October 16, 2018
image from Top Threats To Cloud Computing: Deep Dive

Top Threats To Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the top threat’s for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. They encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

(more available)
Added: October 16, 2018
image from X-Force Threat Intelligence Report - 2016

X-Force Threat Intelligence Report - 2016

This report discusses information gleaned from the notable highlights in cyber threats during the year 2015. It studies notable incidents and targeted malware affecting geographies including Canada, Australia, the United Kingdom, France, Turkey and Japan. It also discusses the barriers that must be overcome in order to prevent cyber attacks from occurring.

(more available)
Added: October 16, 2018
image from 2017 Global IP Reputation Analysis Report

2017 Global IP Reputation Analysis Report

This report provides a monthly snapshot of analysis and trends of IP Reputation globally.

Added: October 15, 2018
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 04:08 UTC (build b1d7be4)