Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Emerging Tech

Below you will find reports with the tag of “Emerging Tech”

image from A Journey Through Hybrid IT And The Cloud

A Journey Through Hybrid IT And The Cloud

This e-Book seeks to provide the reader with some information and insight into the challenges and struggles that come with switching data to a cloud based system.

(more available)
Added: October 16, 2018
image from Automotive And Industrial Ethernet: Moving Beyond Standards Validation To System Level Testing

Automotive And Industrial Ethernet: Moving Beyond Standards Validation To System Level Testing

In this paper, they look at examples in both automotive and industrial networks that highlight the need for more comprehensive testing and introduce an effective validation solution. Topics include Ethernet-CAN/Flexray coexistence, automotive protocols including SOME/IP, ADAS, time-aware shaping including IEEE 802.1Qbv, stream reservation including IEEE 802.1Qav, and testing time synchronization (IEEE 802.1AS), AVB standards (IEEE 802.1Qat, IEEE 802.1Qav), and TSN standards (like IEEE 802.1Qbv, IEEE 802.1Qci, IEEE 802.1CB).

(more available)
Added: October 16, 2018
image from Benefits And Costs Of Alternate Cyber Futures

Benefits And Costs Of Alternate Cyber Futures

This report seeks to answer the following questions, In 2030, will the Internet and related information and communications technologies (ICT) continue to drive global innovation and prosperity? Or, will that bright promise be swamped by an unstable and insecure Internet, so overwhelmed by non-stop attacks that it has become an increasing drag on economic growth?

(more available)
Added: October 16, 2018
image from Midyear Security Report 2015

Midyear Security Report 2015

Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.

(more available)
Added: October 16, 2018
image from Risk and Responsibility in a Hyperconnected World

Risk and Responsibility in a Hyperconnected World

From the report, “Risk and Responsibility in a Hyperconnected World, a joint effort between the World Economic Forum and McKinsey & Company, assesses the necessary action areas, and examines the impact of cyberattacks and response readiness. The report sets these against three alternative scenarios in which economic value from technological innovations is realized or lost depending on models of cyber resilience. It draws on knowledge and opinions derived from a series of interviews, workshops and dialogues with global executives and thought leaders to estimate the potential value to be created through 2020 by technological innovations. It examines the value that could be put at risk if the adoption of such innovations is delayed because more frequent, intense cyberattacks are not met with more robust cyber resilience. Finally, the report draws conclusions from the analysis and research, and offers a 14-point roadmap for collaboration.”

(more available)
Added: October 16, 2018
image from The Evolution And Revolution Of The CISO

The Evolution And Revolution Of The CISO

This report explores both the incremental and transformational skills required for current and future CISO success, examining which fundamental technology and security capabilities matter most and which unexpected skills CISOs will need to acquire to help organizations reshape security to drive business success.

(more available)
Added: October 16, 2018
image from The Moral Component Of Cross Domain Conflict

The Moral Component Of Cross Domain Conflict

This is the final report of a study commissioned by the UK Ministry of Defence (MOD) through the Defence Human Capability Science and Technology Centre (DHCSTC) framework. The study was conducted over a period of six weeks and examines the academic debate pertaining to the moral landscape of conflict that spans different military domains (air, maritime, land, space, cyber). The investigation which is the subject of this report was commissioned by the Programme and Delivery Directorate of the Defence Science and Technology Laboratory (Dstl).

(more available)
Added: October 16, 2018
image from Voice Of The Analyst: An Inside Perspective On Security Operations

Voice Of The Analyst: An Inside Perspective On Security Operations

This report offers the results of a survey that sought to understand the true nature and quality of a SECOP position.

(more available)
Added: October 16, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

The fifth annual State of DevOps Report confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns.

(more available)
Added: October 15, 2018
image from Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

What is the balance of economic benefits and costs conferred upon societies by cyber technologies, also designated here as information and communication technologies (ICT)? And how might that balance change in coming years? This report, prepared as a quantitative foundation for work sponsored by the Zurich Insurance Group, addresses these questions by assessing the current pattern of benefits and costs in countries and globally, mapping their apparent trajectory in recent years, and exploring their possible futures through 2030.

(more available)
Added: October 15, 2018
image from Cyber Security Considerations For Financial Institutions

Cyber Security Considerations For Financial Institutions

This paper discusses the issues that are caused by, “technology innovation and spearheaded by a generation that expects a seamless customer experience, the financial services landscape is undergoing fundamental change, which will no doubt influence the industry’s future cyber security considerations.”

(more available)
Added: October 15, 2018
image from Leadership Compass: Cloud Access Security Brokers

Leadership Compass: Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

(more available)
Added: October 15, 2018
image from Mobile Banking Applications: Security Challenges For Banks

Mobile Banking Applications: Security Challenges For Banks

Accenture and NowSecure, Inc. analyzed the mobile banking app threat landscape based on industry research, customer-facing mobile banking app vulnerability assessments performed by NowSecure, and Accenture’s industry knowledge and experience working with banking institutions. They collaborated to create a report that was designed to provide an understanding of the current- state security environment for customer- facing mobile banking apps, as well as answer some key questions about the state of mobile banking app security.

(more available)
Added: October 15, 2018
image from Simplifying Mobile App Integration With SDKs

Simplifying Mobile App Integration With SDKs

If you’re looking for a paper that talks about Mobile App Integration, this paper is for you.

Added: October 15, 2018
image from The Cloud Balancing Act for IT: Between Promise and Peril

The Cloud Balancing Act for IT: Between Promise and Peril

This paper is put together by a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.

(more available)
Added: October 15, 2018
image from 2017 Data Threat Report Global Edition

2017 Data Threat Report Global Edition

This report from 2017 is based on a survey conducted during October and November of 2016. They surveyed over a thousand senior security executives from across the globe, including from key regional markets in the US, UK, Germany, Japan, Australia, Brazil, and Mexico, and key segments such as federal government, retail, finance, and healthcare.

(more available)
Added: October 14, 2018
image from 2017 Fintech Security Analysis Report

2017 Fintech Security Analysis Report

This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises.

(more available)
Added: October 14, 2018
image from An Introduction To Machine Learning For Mobile Security

An Introduction To Machine Learning For Mobile Security

A close inspection of one of the most exciting and promising fields of research in 2017, and how it might be applied to the fast-moving world of mobile security.

(more available)
Added: October 14, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. They then outline best practices for cost-effectively mitigating risk and euring quality in life-critical deployment scenarios.

(more available)
Added: October 14, 2018
image from Data Breach Digest: IoT Calamity, The Panda Monium

Data Breach Digest: IoT Calamity, The Panda Monium

This is a report based on a one man’s experience with IoT security.

Added: October 14, 2018
image from Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

In this paper, they explore the underlying challenges with regard to Cyber Risk management and analyze the nature of increasingly stringent regulatory demands. Putting these pieces together, they frame five strategic moves which they believe will enable business needs, their fiduciary responsibilities with regard to Cyber Risk, and regulatory requirements.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)