Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Lessons in Cybersecurity: How Education Coped in the Shift to Distance Learning

Lessons in Cybersecurity: How Education Coped in the Shift to Distance Learning

This report is based on a survey of 75 IT decision-makers and 500 students. It aims to look at cybersecurity in education, and why preparation for a cyber threat matters. (more available)
Added: December 18, 2020
image from 2020 State of Data Security Report- 10 Trends to Watch

2020 State of Data Security Report- 10 Trends to Watch

This report is based on a survey aimed at understanding how businesses keep information safe. They outline 10 data breach trends and how they have changed in 2020. (more available)
Added: December 16, 2020
image from Cybersecurity Topics: How Employees Impact Cyber Defense

Cybersecurity Topics: How Employees Impact Cyber Defense

This survey looked at company security on the employee level, finding that many employees are not careful with their data.
Added: December 1, 2020
image from 2021 Data Risk Report: Financial Services

2021 Data Risk Report: Financial Services

This report focus on the data security of the financial industry: banking, insurance, and investments. It draws correlations between the current state of the security and the threats that are yet to come. (more available)
Added: November 30, 2020
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

A survey of 2,200 IT professionals from organizations of 250 or more employees. Focuses on attitudes on and about cybersecurity.
Added: November 21, 2020
image from Cybersecurity Awareness Month Survey Report September 2020

Cybersecurity Awareness Month Survey Report September 2020

This study was conducted to better understand consumer behavior around internet-connected devices and perceptions of security. It looks into generational differences in perception and behavior changes during COVID-19. (more available)
Added: November 6, 2020
image from Cybersecurity Challenges in Financial Services - Marker Survey Report

Cybersecurity Challenges in Financial Services - Marker Survey Report

This report is based on a survey of 250 cybersecurity and IT decision-makers. It aims to provide insight on cybersecurity challenges in financial services in the age of COVID-19. (more available)
Added: November 6, 2020
image from Global Incident Response Threat Report 2020

Global Incident Response Threat Report 2020

This report paints a picture of the evolving threat landscape by discussing the impact of COVID-19 and the U.S. presidential election as well as providing practices for security teams looking to fight back. (more available)
Added: November 1, 2020
image from 2020 Unit 42 IoT Threat Report

2020 Unit 42 IoT Threat Report

This annual report looks at changes in internet of things security.
Added: November 1, 2020
image from Connected Medical Device Security: A Deep Dive into Healthcare Networks

Connected Medical Device Security: A Deep Dive into Healthcare Networks

This report analyzes the security of healthcare delivery organizations. It looks at the risks the industry faces and provides effective strategies to reduce cybersecurity risks and defend healthcare networks. (more available)
Added: October 30, 2020
image from Company-Issued Computers: What Are Employees Really Doing With Them?

Company-Issued Computers: What Are Employees Really Doing With Them?

This report comes from a survey of more than 1,000 businesspeople around the world that have a company-issued computing device. It looks into what people are using their work computers for, and how that can leave them vulnerable to cyber threats. (more available)
Added: October 29, 2020
image from The State of Industrial Cybersecurity in the Era of Digitalization

The State of Industrial Cybersecurity in the Era of Digitalization

An annual survey on the challenges and response to those challenges of cybersecurity in the Industrial Control Systems (ICS) space.
Added: October 27, 2020
image from Online Security Survey

Online Security Survey

This infographic is based off of a survey of 3,000 US consumer to better understand behaviors and beliefs around online security. (more available)
Added: October 25, 2020
image from 2020 End User Phishing Report: Business Beware

2020 End User Phishing Report: Business Beware

This report is based on the results of a comprehensive interactive survey of 1,123 users in the United States, conducted in September 2020, who received 10 emails and were asked to identify whether each email was authentic or a phishing attack. (more available)
Added: October 20, 2020
image from Looking Into the Eye of the Interplanetary Storm

Looking Into the Eye of the Interplanetary Storm

This article offers a glimpse into the inner workings of the Interplanetary Storm botnet, provides an exhaustive technical analysis of the Golang-written binaries along with an overview of the protocol internals and finally, some attribution information. (more available)
Added: October 18, 2020
image from New Vulnerability Found: Executive Overconfidence

New Vulnerability Found: Executive Overconfidence

This report attempts to understand the theory and practice of web application security in organizations worldwide.
Added: October 14, 2020
image from Cybersecurity: The Human Challenge

Cybersecurity: The Human Challenge

This study provides new insights into the state of cybersecurity skills and resources across the globe.
Added: October 14, 2020
image from 2020 SMB IT Security Report

2020 SMB IT Security Report

This report focuses on cybersecurity for small and medium sized businesses for 2020. It goes over how cyber attacks have changed, how remote work has an effect, and more. (more available)
Added: October 7, 2020
image from 2020 State of Malware Report

2020 State of Malware Report

This report goes in-depth into the changes in malware attacks for 2020, using data collected from honey pots, telemetry, and research conducted by threat analysts and reporters in 2019. (more available)
Added: September 28, 2020
image from What's Lurking in the Shadows 2020?

What's Lurking in the Shadows 2020?

This report provides recommendations on how companies can manage the threat posed by shadow IoT devices.
Added: September 27, 2020
image from When the World Stayed Home

When the World Stayed Home

This report was compiled from interviews with 1,004 company leaders in order to find the effect of remote work on their companies. (more available)
Added: September 27, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 46
  • »
  • »»
© Cyentia Institute 2021
Library updated: January 18, 2021 20:05 UTC (build 7e736b2)