Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Threat Intelligence Executive Report 2021 Vol. 4

Threat Intelligence Executive Report 2021 Vol. 4

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 21, 2022
image from Threat Intelligence Executive Report 2021 Vol. 2

Threat Intelligence Executive Report 2021 Vol. 2

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During January and February 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from 2020 Threat Detection Report

2020 Threat Detection Report

This report is an in-depth analysis of tens of thousands of threats detected across our customers’ environments, this research arms security leaders and their teams with a unique understanding of the threats they’re facing.

(more available)
Added: April 19, 2022
image from 2022 Global Threat Report

2022 Global Threat Report

The CrowdStrike 2022 Global Threat Report provides crucial insights into what security teams need to know about to stay ahead of today’s threats in an increasingly ominous threat landscape.

(more available)
Added: April 19, 2022
image from Emerging Threats Protection Report

Emerging Threats Protection Report

In this report, we have researched the detected new round of offensive and destructive cyberattacks directed against Ukraine’s digital infrastructure and its alliances.

(more available)
Added: April 13, 2022
image from The State of Stalkerware in 2021

The State of Stalkerware in 2021

This report shows data from 2021 that was affected by stalkerware globally.

Added: April 13, 2022
image from 2022 BrightCloud Threat Report

2022 BrightCloud Threat Report

This is the 2022 BrightCloud Threat Report.

Added: April 8, 2022
image from 2022 Global Mobile Threat Report

2022 Global Mobile Threat Report

A review of mobile device application security, based upon a combination of data from Zimperium’s product and suvey based results.

(more available)
Added: April 6, 2022
image from 2021 Threat Detection Report

2021 Threat Detection Report

This report is based on in-depth analysis of roughly 20,000 confirmed threats detected across our customers’ environments, this research arms security leaders and their teams with actionable insights into the malicious activity and techniques we observe most frequently.

(more available)
Added: April 5, 2022
image from 2022 Threat Detection Report

2022 Threat Detection Report

This is the 2022 Red Canary Threat Detection Report. This report goes in-depth with over 30,000 confirmed threats detected across our customers environments, this research arms security leaders and their teams with actionable insight into the threats we observed, techniques adversaries most commonly leverage, and trends that help you understand what is changing and why.

(more available)
Added: April 5, 2022
image from Flexera 2022 State of ITAM Report

Flexera 2022 State of ITAM Report

The report evaluates the responses of 465 global IT professionals who manage, advise, and participate in ITAM, SAM, and HAM activities in organizations of 1,000 or more employees. The insights gleaned from these responses provide vision into the strategic initiatives across these ITAM practices and practitioners.

(more available)
Added: February 11, 2022
image from Cyber Signals

Cyber Signals

A cyberthreat intelligence brief informed by the latest Microsoft threat data and research. This content offers an expert perspective into the current threat landscape, discussing trending tactics, techniques and strategies used by the world’s most prolific threat actors.

(more available)
Added: February 9, 2022
image from Understanding XDR Requirements: What XDR Is and Why Organizations Need It

Understanding XDR Requirements: What XDR Is and Why Organizations Need It

CISOs aren’t alone in recognizing the need for new threat detection and response strategies. In fact, security technology providers are championing a new technology initiative dubbed eXtended Detection and Response (XDR). XDR tools are intended to solve many threat detection and response issues by providing an integrated security architecture, advanced analytics, and simplified operations. Despite this innovation, however, users remain confused about XDR and where it could fit into their security programs. This report answers “what is XDR and which are the most important XDR requirements?”

(more available)
Added: January 24, 2022
image from Cyber Security in Focus 2022

Cyber Security in Focus 2022

An annual state of the market report, which explores the views of a snapshot cohort of 55 security leaders on key themes, including; the skills shortage, barriers to strategy execution, the business perception of cyber security, and more.

(more available)
Added: January 20, 2022
image from Cloud and Threat Report - January 2022

Cloud and Threat Report - January 2022

Takes a look back at the top trends in cloud attacker activities and cloud data risks from 2021 compared to 2020.

(more available)
Added: January 13, 2022
image from Hindsight Cybersecurity: Seven Key Lessons Learned By Breach Victims

Hindsight Cybersecurity: Seven Key Lessons Learned By Breach Victims

This report shares seven key lessons learned by breach victims. Each lesson includes simple recommendations and tips, many of which do not require organizations to purchase any tools.

(more available)
Added: January 7, 2022
image from Sophos 2022 Threat Report

Sophos 2022 Threat Report

Sophos’ annual threat report drawn from incident response engagements with customers.

Added: December 13, 2021
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. But they also deliver significant risk, with Remote Desktop Protocol (RDP) alone serving as the vehicle of choice for as much as 55% of ransomware attacks. This report explores how cloud-based apps – from storage services to social media apps – threaten your network security.

(more available)
Added: December 10, 2021
image from 2021 Cyber Security Threat Trends

2021 Cyber Security Threat Trends

The data used in this report comes from Cisco Umbrella, Cisco’s cloud delivered security service that includes DNS-layer security, secure web gateway, firewall, cloud access security broker (CASB) functionality, and threat intelligence.

(more available)
Added: December 9, 2021
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

Drawing on Duo’s customer basis of millions of devices and the authentication traffic associated with them between June 2020 and May 2021, this report reviews trends in authentication methods and includes firmographic breakdowns.

(more available)
Added: October 17, 2021
image from Cyber-Espionage Report

Cyber-Espionage Report

This inaugural report covers seven years of data from the DBIR as well as additional Verizon information, providing an overview of the cyber-espionage landscape. Attackers, motivations, methods, and victims are all focus areas.

(more available)
Added: July 30, 2021
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 08:09 UTC (build b1d7be4)