Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Database

Below you will find reports with the tag of “Database”

image from 2017 Global Security Report

2017 Global Security Report

This annual report takes a look at the security events of 2017 and projects what is to come in 2018.

(more available)
Added: October 15, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

The fifth annual State of DevOps Report confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns.

(more available)
Added: October 15, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). This paper both references existing research and expands upon it in later sections.

(more available)
Added: October 15, 2018
image from Cryptowall Report

Cryptowall Report

This is a report that deals with the CryptoWall Malware. The focus of this report is to study the prevalence and global impact of CryptoWall.

(more available)
Added: October 15, 2018
image from Data Protection Under POPI

Data Protection Under POPI

This white paper provides insight into becoming complaint with South Africa’s Protection of Personal Information Bill. (POPI)

Added: October 15, 2018
image from Email Fraud and DMARC Adoption Trends Second Half 2017

Email Fraud and DMARC Adoption Trends Second Half 2017

In this inaugural report, they take a look at the state of DMARC, leveraging Agari’s Email Threat Center, and its unique global and sector view into our customers’ DMARC traffic over the last 6 months of 2017. They also explore publicly available statistics and trends on DMARC usage. Finally, for a global view on email domains not visible to the Threat Center, they incorporate intelligence from Farsight Security, the world’s largest provider of historical and real-time passive DNS data. Farsight DNSDB provides an unmatched view into the diverse and often volatile DMARC policies located in global DNS records.

(more available)
Added: October 15, 2018
image from Gemalto Expands Service Based Security Platform With SafeNet Data Protection On Demand

Gemalto Expands Service Based Security Platform With SafeNet Data Protection On Demand

This report offers a good look at Gemalto’s new service based security platform.

Added: October 15, 2018
image from Just in Time Research: Data Breaches in Higher Education

Just in Time Research: Data Breaches in Higher Education

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this review will be used to inform EDUCAUSE research, programs, products, and services.

(more available)
Added: October 15, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report May 2016

SecureWorks Threat Intelligence Executive Monthly Report May 2016

This report from May 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 15, 2018
image from Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

This report documents research conducted as part of the project “Building a Strategy for Cyber Support to Corps and Below.” RAND Arroyo Center was asked by U.S. Army Cyber Command’s G35 office to develop and document an Army strategy for providing cyber sup- port to corps and below (CSCB) units that describes how the Army should use its available resources to achieve mission objectives.

(more available)
Added: October 15, 2018
image from A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

This paper discusses how the GDPR will affect you as a non-European company and provides insights into what you should do to prepare.

(more available)
Added: October 14, 2018
image from Cloud Security Report 2017

Cloud Security Report 2017

This report includes research on the evolving state of cloud security.

Added: October 14, 2018
image from Cyber Vulnerability: Where do you Stand

Cyber Vulnerability: Where do you Stand

This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data.

(more available)
Added: October 14, 2018
image from Report Q1 2015 (January - March 2015)

Report Q1 2015 (January - March 2015)

A breakdown of the data, and types of, cyber attacks that occurred in the first quarter of 2015.

Added: October 14, 2018
image from Secure The Vote With Zero Trust Security

Secure The Vote With Zero Trust Security

This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers.

Added: October 14, 2018
image from Security Response: How safe is your quantified self?

Security Response: How safe is your quantified self?

Fueled by technological advances and social factors, the quantified self movement has experienced rapid growth. Quantified self, also known as self-tracking, aims to improve lifestyle and achievements by measuring and analyzing key performance data across a range of activities. This report deals with the threats and vulnerabilities that are present in the devices used to provide those measurements and analysis.

(more available)
Added: October 14, 2018
image from The Definitive Guide To Micro Segmentation

The Definitive Guide To Micro Segmentation

This eBook gives a detailed understanding of Adaptive segmentation and how it can be effectively used for cloud security.

Added: October 14, 2018
image from 2014 Internet Crime Report

2014 Internet Crime Report

The 2014 Internet Crime Report highlights the IC3’s efforts to prevent and reduce the prevalence and impact of Internet crimes, and reveals at least two budding Internet crime trends. First, the increased use of social media has provided a quintessential goldmine of personal data for perpetrators. More victims are submitting complaints documenting how social media was utilized to perpetrate frauds, or indicating the perpetrator initiated a relationship through social engineering. Second, the emerging popularity of virtual currency has attracted perpetrators, who are capitalizing on the vulnerabilities of the digital currency systems.

(more available)
Added: October 13, 2018
image from 6 Important Steps To Evaluating A Web Security Solution

6 Important Steps To Evaluating A Web Security Solution

Six Important Steps to Evaluating a Web Security Solution from EdgeWave®, offers IT professionals a checklist for evaluating Web security vendor solutions. The goal is to help you size up competitive offerings and understand new approaches to the critical problem of protecting your organization from mailcious web sites and inappropriate web use.

(more available)
Added: October 13, 2018
image from Annual Fraud Benchmarking Report:

Annual Fraud Benchmarking Report:

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 13, 2018
image from Build Vs Buy: Dynamic Authorization Solutions

Build Vs Buy: Dynamic Authorization Solutions

Within this review, you’ll find an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 13
  • 14
  • 15
  • 16
  • 17
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 04:08 UTC (build b1d7be4)