Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Trends In Security Framework Adoption

Trends In Security Framework Adoption

This report, is based on a survey of 338 IT and security professionals in the US. The goal of the survey was to quantify adoptions of security frameworks.

(more available)
Added: October 26, 2018
image from Unsecured Firebase Databases: Exposing Sensitive Data Via Thousands Of Mobile Apps

Unsecured Firebase Databases: Exposing Sensitive Data Via Thousands Of Mobile Apps

This report focuses on the Appthority Mobile Threat Team’s latest discovery, a new variant of the HospitalGown vulnerability which occurs when app developers fail to require authentication to a Google Firebase cloud database.

(more available)
Added: October 26, 2018
image from 2015 Centri Data Breach Report

2015 Centri Data Breach Report

This industry report attempts to answer the question: Why are cyberattacks still successful? Along the way it examines the types of problems that enterprises face, common types of attacks, the true cost of data breaches to major organizations and the tools available today to mitigate these threats.

(more available)
Added: October 25, 2018
image from 2015 Cyber Claims Study

2015 Cyber Claims Study

The fifth annual NetDiligence® Cyber Claims Study uses actual cyber liability insurance reported claims to illuminate the real costs of incidents from an insurer’s perspective. Our goal is to raise awareness about cyber risk within the risk manager community.

(more available)
Added: October 25, 2018
image from 2015 Insider Threat Report

2015 Insider Threat Report

Based on survey responses from more than 800 senior business managers and IT professionals in major global markets, the global edition of this report provides present-day insight an opinion not the host of data breach threats that enterprise organizations face on a daily basis.

(more available)
Added: October 25, 2018
image from 2015 Threats Report

2015 Threats Report

In this report, McAfee looks back on the past 5 years of cyber threats. They then breakdown two key points, 1) How do attackers enter a malware infected system and exfiltrate information and 2) Cyber attacks on graphic processing units and (GPU) devices.

(more available)
Added: October 25, 2018
image from 2016 Data Breach Investigations Report

2016 Data Breach Investigations Report

Verizon’s annual report on data breaches in 2016

Added: October 25, 2018
image from 2016 State of SMB Cybersecurity

2016 State of SMB Cybersecurity

This report deals with the state of cybersecurity in small and medium-sized businesses. To develop this research, they surveyed 598 individuals in companies with a headcount from less than 100 to 1,000.

(more available)
Added: October 25, 2018
image from 2017 Annual Security Report

2017 Annual Security Report

The Annual Cybersecurity Report highlights the relentless push-and-pull dynamic between cyber attackers and cyber defenders. It is intended to help organizations respond effectively to today’s rapidly evolving and sophisticated threats.

(more available)
Added: October 25, 2018
image from 2017 Global Cybersecurity Assurance Report Card

2017 Global Cybersecurity Assurance Report Card

A survey-based report of over 700 individuals. The survey and resulting analysis was perfomed by CyberEdge.

Added: October 25, 2018
image from 2018 Global Study On Application Security

2018 Global Study On Application Security

Ponemon Institute is pleased to present the findings of the 2018 Global Study on The State Application Security sponsored by Arxan Technologies. We surveyed 1,399 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses when running in unsecured environments and how they are addressing this risk in practice.

(more available)
Added: October 25, 2018
image from 2018 Incident Response Insights Report

2018 Incident Response Insights Report

This report shares insights and valuable lessons from an examination of the threats in 2017.

Added: October 25, 2018
image from Addressing The Australian Signals Directorate Essential Eight

Addressing The Australian Signals Directorate Essential Eight

In 2017, the Australian Signals Directorate (ASD) updated its list of mitigation strategies designed to help organisations reduce the risk of unauthorised access and minimise the exposure of sensitive information in case of a breach. In this new version, the directorate extended its core policies known as the Top 4 to encompass eight essential mitigation strategies. This paper seeks to provide assistance with privileged access security under these new guidelines.

(more available)
Added: October 25, 2018
image from Avast Data Protection Report 2017

Avast Data Protection Report 2017

This simple little report takes a look at a survey conducted among 11,417 Avast users worldwide, Avast gauged people’s views regarding the value of their data stored in online accounts like email, shopping and social networking sites, and their habits when it comes to protecting their data. The results show that, while many respondents view their data as having actual financial value, they aren’t taking proper measures when affected by a data breach.

(more available)
Added: October 25, 2018
image from Cloud Security Trends: October 2017

Cloud Security Trends: October 2017

This is a report on cloud security trends.

Added: October 25, 2018
image from Crowdstrike Services Casebook Report 2017

Crowdstrike Services Casebook Report 2017

This report provides key takeaways that can inform both executive stakeholders and security professionals how to respond to intrusions more effectively. Most importantly, it offers recommendations that organizations can implement proactively — right now — to improve their ability to prevent, detect and respond to attacks.

(more available)
Added: October 25, 2018
image from Cybersecurity Insights Volume 3: The CEO's Guide To Cyberbreach Response

Cybersecurity Insights Volume 3: The CEO's Guide To Cyberbreach Response

This report takes a look at cyberbreach responses and gives guidance as to what might be the best way to respond to a cyberbreach.

(more available)
Added: October 25, 2018
image from DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention System (HIPS) of F-Secure’s security products.

(more available)
Added: October 25, 2018
image from Definitive Guide To Cloud Thread Protection

Definitive Guide To Cloud Thread Protection

In this eBook, they will discuss the state of cloud threat protection and why it needs a new approach, and take a deep dive into the underlying technologies and must-have components powering effective cloud threat protection. They will then identify the data sources needed in order to gain the type of granular visibility that can ensure successful cloud threat protection and deployment paths for enforcing safe cloud access. Next, they will outline proven best practices around threat protection being employed in real-world enterprises today.

(more available)
Added: October 25, 2018
image from How to dramatically improve corporate IT without spending millions

How to dramatically improve corporate IT without spending millions

This research presets a list of vectors commonly used by attackers to compromise internal networks after achieving initial access. It delivers recommendations on how to best address the issues. The goal is to help defenders focus efforts on the most important issues by understanding the attackers’ playbook, thereby maximizing results.

(more available)
Added: October 25, 2018
image from Incident Report: In The Nick Of Time

Incident Report: In The Nick Of Time

This short report analyzes a specific threat incident.

Added: October 25, 2018
  • ««
  • «
  • 30
  • 31
  • 32
  • 33
  • 34
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 27, 2025 00:09 UTC (build b1d7be4)