Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Taking control of security operations

Taking control of security operations

The threat landscape is constantly evolving- and the tools you used to protect your business yesterday certainly won’t keep you safe tomorrow. (more available)
Added: June 30, 2022
image from SANS 2022 Ransomeware Defense Report

SANS 2022 Ransomeware Defense Report

In this white-paper, we address both high-level concepts: With respect to ransomware, what are the current adversary trends, and then what can organizations do to defend themselves (or better defend themselves)? (more available)
Added: June 28, 2022
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

The CDR is the most geographically comprehensive, vendor-agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches, the CDR surveys the perceptions of IT security professionals, gaining insights into how they see the world. (more available)
Added: June 23, 2022
image from 2022 Envisions Critical Threat Report

2022 Envisions Critical Threat Report

Amid our worldwide bedlam, this report is aimed at informing for the purposes of preparation. Whether you find yourself in the midst of government affairs, technology management, or business operations, the state of rising factors impacts nearly every country, either directly or indirectly, and provides a ripe setting for cyberattacks to thrive. (more available)
Added: June 21, 2022
image from Radware 5G Protection

Radware 5G Protection

Service providers are undergoing a technological revolution, transforming their networks and computing infrastructure to dramatically change the user experience and support new services in an app-driven world tailored to industry and business objectives. (more available)
Added: June 21, 2022
image from Mobile Banking Heists: The Global Economic Threat

Mobile Banking Heists: The Global Economic Threat

In this report, we examine 10 prolific banking trojans targeting Android mobile apps of users worldwide, detailing their features and capabilities. (more available)
Added: June 21, 2022
image from Ransomware Threat Report 2022

Ransomware Threat Report 2022

As these ransomware gangs and RaaS operators find new ways to remove technical barriers and up the ante, ransomware will continue to challenge organizations of all sizes in 2022. (more available)
Added: June 16, 2022
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

In the 2021 Dup Trusted Access Report, we’ll explore how companies are currently securing hybrid work and what makes a solid and secure remote access strategy. (more available)
Added: June 15, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. (more available)
Added: June 15, 2022
image from The 2019 Duo Trusted Access Report

The 2019 Duo Trusted Access Report

For The 2019 Duo Trusted Access Report, our data shows that Duo customers across all industries are starting to implement zero-trust security principles to secure their workforce. (more available)
Added: June 15, 2022
image from Blackberry 2022 Threat Report

Blackberry 2022 Threat Report

The Blackberry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a high-level look at issues affecting cybersecurity across the globe, both directly and indirectly. (more available)
Added: June 13, 2022
image from The State of Cybersecurity 2022 Trends

The State of Cybersecurity 2022 Trends

Arctic Wolf’s 2022 Security Trends Report provides insight into the current and future state of these cybersecurity teams as they attempt to move their security programs forward while dealing with an ever-evolving threat environment. (more available)
Added: June 10, 2022
image from Deepwatch Threat Intelligence 2022

Deepwatch Threat Intelligence 2022

In 2021, the industry saw a transition into threat actor separation of duties, with an increase in groups focused on obtaining and selling access to victims (Initial Access Brokers). (more available)
Added: June 8, 2022
image from CyberCrime Trends and Highlights Q3 2021

CyberCrime Trends and Highlights Q3 2021

From Q2 to Q3 2021, ransomware gained increasing attention. In Q3 2021, threat actors also continued mass exploitation of vulnerabilities in systems, including those in Microsoft Exchange. (more available)
Added: May 16, 2022
image from Quantifying the financial savings Protective DNS (PDNS) brings to the UK public sector

Quantifying the financial savings Protective DNS (PDNS) brings to the UK public sector

This report provides an analysis of the DNS queries blocked by Protective DNS, finds commonalities among the end users that are protected, and uses a financial model to estimate the value of the threat prevention provided by Protective DNS to the UK economy. (more available)
Added: May 11, 2022
image from Threat Landscape Report Q2 2018

Threat Landscape Report Q2 2018

The Fortinet Threat Landscape Report Q2 2018 features a healthy dose of international intrigue, major disruptions, global infections, innovative malware, clever heists, and more. (more available)
Added: May 5, 2022
image from M-Trends 2021

M-Trends 2021

As ransomware operators were attacking state and municipal networks alongside hospitals and schools, a global pandemic response to COVID-19 necessitated a move to remote work for a significant portion of the economy. (more available)
Added: April 28, 2022
image from M-Trends 2022

M-Trends 2022

M-Trends provides an inside look at the evolving cyber threat landscape directly from global incident response investigations and threat intelligence analysis of high-impact attacks and remediations around the globe. (more available)
Added: April 28, 2022
image from Sophos 2022 Threat Report: Interrelated threats target an interdependent world

Sophos 2022 Threat Report: Interrelated threats target an interdependent world

Ransomware has staked its claim as a major element of the cybercriminal ecosystem. As we move into 2022, ransomware shows no sign or slowing down, through its business model has gone through some changes the seem likely to persist and even grow over the coming years. (more available)
Added: April 27, 2022
image from 2021 Webroot BrightCloud Threat Report

2021 Webroot BrightCloud Threat Report

The threat intelligence, trends and details presented in the 2021 Webroot BrightCloud Threat Report are based on data continuously and automatically captured by the Webroot Platform, which is the proprietary machine learning-based architecture that powers all of our Webroot protection and BrightCloud services. (more available)
Added: April 25, 2022
image from Threat Intelligence Executive Report 2021 Vol. 5

Threat Intelligence Executive Report 2021 Vol. 5

The Secureworks Counter Threat (CTU) research team analyzes security threats and helps organizations protect their systems. During July and August 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends and identified lessons to consider. (more available)
Added: April 21, 2022
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 49
  • »
  • »»
© Cyentia Institute 2022
Library updated: June 30, 2022 20:09 UTC (build d6199b1)