Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Cybersecurity Insights Volume 4: The CEO's Guide To Navigating The Threat Landscape

Cybersecurity Insights Volume 4: The CEO's Guide To Navigating The Threat Landscape

This report discusses ransomware and how organizations can better protect their digital assets.

Added: October 26, 2018
image from Data Breach Reports: May 31, 2018

Data Breach Reports: May 31, 2018

This report provides a comprehensive list of all the data breaches that have occurred in the spring of 2018.

Added: October 26, 2018
image from Data Loss Prevention 2017

Data Loss Prevention 2017

This report is geared towards the healthcare community and seeks to provide helpful information to guide organizations in their Data Loss Prevention struggles.

(more available)
Added: October 26, 2018
image from Definitive Guide To Secure Remote Access

Definitive Guide To Secure Remote Access

The purpose of this document is to provide answers to what to look for when choosing a security tool for remote access to internal applications.

(more available)
Added: October 26, 2018
image from Demystifying Vulnerabilitiy Management

Demystifying Vulnerabilitiy Management

This report takes a close look at vulnerability management and seeks to make it a far simpler task.

Added: October 26, 2018
image from Deployment Architectures For The Top 20 CASB Use Cases

Deployment Architectures For The Top 20 CASB Use Cases

This document reviews the primary CASB deployment modes and then describes the 20 most common CASB use cases, revealing which deployment mode best supports each of the use cases.

(more available)
Added: October 26, 2018
image from Healthcare Breach Report 2018

Healthcare Breach Report 2018

Bitglass’ fourth-annual Healthcare Breach Report analyzes data from the US Department of Health and Human Services’ “Wall of Shame,” where organizations that store or handle PHI are required to disclose breaches that affect at least 500 individuals. Read on to learn more about the breaches that caused the most damage in 2017 and to look at the year ahead in data security.

(more available)
Added: October 26, 2018
image from How Much Is the Data on Your Mobile Device Worth?

How Much Is the Data on Your Mobile Device Worth?

The purpose of this research, sponsored by Lookout, is to understand the value of the data we access and store on our mobile devices and if we are doing enough to protect that data.

(more available)
Added: October 26, 2018
image from Insider Threat Intelligence Report 2017

Insider Threat Intelligence Report 2017

This report is the second release of the Dtex Insider Threat Intelligence Report – an initiative started in 2015 to track, analyze, and share the impact of human behavior on enterprises of all sizes and industries.

(more available)
Added: October 26, 2018
image from Internet Security Report Quarter 1

Internet Security Report Quarter 1

Have you ever wondered what 0 types of cyber attacks affect small to midsize businesses (SMBs) and distributed enterprises (DEs)? Well, you’ve come to the right place.

(more available)
Added: October 26, 2018
image from Ransomware: How Consumers And Businesses Value Their Data

Ransomware: How Consumers And Businesses Value Their Data

IBM fielded a US-based consumer and business research study to determine the value people place on data and their awareness and knowledge about ransomware. The results are alarming.

(more available)
Added: October 26, 2018
image from Rethinking Data Security With A Risk Adaptive Approach

Rethinking Data Security With A Risk Adaptive Approach

This report discusses the idea that there needs to be a paradigm shift in the approach to cybersecurity. It posits that the shift should occur by studing human behavior and interaction with data.

(more available)
Added: October 26, 2018
image from SANS 2018 Security Operations Center Survey: The Definition of SOC-cess?

SANS 2018 Security Operations Center Survey: The Definition of SOC-cess?

This report is based on a survey, that is intended to provide a community perspective on what security operations centers (SOCs) look like within organizations across the globe, as well as data and guidance to enable organizations to build, manage, maintain and mature effective and efficient SOCs.

(more available)
Added: October 26, 2018
image from Securing Smart Cities:Moving Toward Utopia With Security In Mind

Securing Smart Cities:Moving Toward Utopia With Security In Mind

This paper surveys some of the existing smart technologies currently used in smart cities worldwide. Much like our previous reports on exposed smart devices and the hacking of robots in smart factories, this paper will discuss the risks of using smart technologies in critical sectors and will provide actionable steps to help local governments and urban developers design more secure smart cities.

(more available)
Added: October 26, 2018
image from Securing The Enterprise's Cloud Workloads On Microsoft Azure

Securing The Enterprise's Cloud Workloads On Microsoft Azure

This paper seeks to help organizations understand that Microsoft Azure (Azure) has a lot more to offer than cost savings. Enterprises with the highest levels of cloud adoption, typically, not only completely re-architect their applications, but also take advantage of automation to streamline the entire development and deployment process. They adopt DevOps pipelines and use CI/CD (continuous integration and continuous delivery) tools with the objective of nimbly meeting customer and business needs.

(more available)
Added: October 26, 2018
image from SilverTerrier: The Next Evolution In Nigerian Cybercrime

SilverTerrier: The Next Evolution In Nigerian Cybercrime

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 26, 2018
image from State Of The Endpoint 2017

State Of The Endpoint 2017

This report seeks to provide answers to many questions related to the failures of endpoint security that are occuring even though there has been a shift in technology and strategy.

(more available)
Added: October 26, 2018
image from The Rise of Ransomware

The Rise of Ransomware

From the report, “We are pleased to present the findings of The Rise of Ransomware, sponsored by Carbonite, a report on how organizations are preparing for and dealing with ransomware infections. We surveyed 618 individuals in small to medium-sized organizations who have responsibility for containing ransomware infections within their organization.”

(more available)
Added: October 26, 2018
image from The State Of The Kubernetes Ecosystem

The State Of The Kubernetes Ecosystem

This eBook gives a detailed breakdown of the current state of the Kubernetes Ecosystem.

Added: October 26, 2018
image from Threat Advisory: Bookairfare.com

Threat Advisory: Bookairfare.com

This is a threat advisory for Bookairfare.com

Added: October 26, 2018
image from Threats Report - December 2016

Threats Report - December 2016

An interview-based report, drawing from interviews of 400 security professionals. Covers topics such as the current state of SOC design, ransomware, and the rise of malware in otherwise legitimate software.

(more available)
Added: October 26, 2018
  • ««
  • «
  • 29
  • 30
  • 31
  • 32
  • 33
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 27, 2025 00:09 UTC (build b1d7be4)