Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from IT Security at SMBs: 2017 Benchmarking Survey

IT Security at SMBs: 2017 Benchmarking Survey

This report presents the results of an in-depth primary market research survey of cyber security decision-makers in small to mid-sized businesses in the United States, conducted during August and September 2017. The goal of their research was to understand how SMBs, undertake decision-making in the context of their internet security, how they evaluate security solutions, and their budgetary concerns.

(more available)
Added: October 25, 2018
image from Kubernetes Deployment And Security Patterns

Kubernetes Deployment And Security Patterns

This is the 2nd ebook from The New Stack’s series focused on the Kubernetes ecosystem. Unlike the 1st ebook that centered on the state of the Kubernetes ecosystem, this ebook shines a light on answering the question: How well does Kubernetes work in production?

(more available)
Added: October 25, 2018
image from M-Trends 2018

M-Trends 2018

In this report they look at incidents that occurred between October 2016 and September 2017.

Added: October 25, 2018
image from National Exposure Index

National Exposure Index

The term “exposure” can mean many things. In the context of this report, they define “exposure” as offering services that either expose potentially sensitive data over cleartext channels or are widely recognized to be unwise to make available on the internet, such as database systems. They looked for the presence of 30 of the most prevalent TCP services across the internet, tallied up the results and performed cross-country comparisons to produce a National Exposure Index, a ranked aggregation of the results of Rapid7’s internet-wide scans of 16 usually cleartext or highly targeted common services, based on the in-country prevalence of those services.

(more available)
Added: October 25, 2018
image from Preparing For The EU General Data Protection Regulation

Preparing For The EU General Data Protection Regulation

This white paper prepares you for GDPR by providing a basic understanding of what is involved with the different sections of the regulations, and how technology can be used to drive the initial discovery which can be used to drive the plan as well as the ongoing process of maintaining compliance.

(more available)
Added: October 25, 2018
image from Quarterly Threat Summary Q3 2016

Quarterly Threat Summary Q3 2016

This Quarterly report offers key takeaways from the third Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 25, 2018
image from Ransomware and Businesses 2016

Ransomware and Businesses 2016

This report from Symantec gives a variety of information about ransomware. It gives an overview, discusses the factors driving the growth and persistence of ransomware, infection vectors, platforms affected, the major ransomware families and finally, how businesses are going to be impacted.

(more available)
Added: October 25, 2018
image from Ransomware: Past, Present and Future

Ransomware: Past, Present and Future

This paper details the history and abilities of Ransomware, and where it is headed in the coming years.

Added: October 25, 2018
image from SANS Survey on Security Optimization

SANS Survey on Security Optimization

This report discusses the proper workflows in Security Optimization.

Added: October 25, 2018
image from Secure The App Not The Device

Secure The App Not The Device

This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.”

Added: October 25, 2018
image from Securing Operational Technology: How Vulnerable Is Our Critical National Infrastructure

Securing Operational Technology: How Vulnerable Is Our Critical National Infrastructure

This paper looks at utilitiy providers and the cybersecurity threats that attack them.

Added: October 25, 2018
image from Securing The Enterprise's Cloud Assets On Amazon Web Services

Securing The Enterprise's Cloud Assets On Amazon Web Services

This report provides helpful advice on how to secure Cloud Assets on Amazon’s Web Services.

Added: October 25, 2018
image from Security In A Remote Access World

Security In A Remote Access World

This report looks at six trends that IT execs need to adress now.

Added: October 25, 2018
image from SilverTerrier: Rise Of Nigerian Business Email Compromise

SilverTerrier: Rise Of Nigerian Business Email Compromise

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 25, 2018
image from Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

This report provides an inside look at a threat being downloaded on Google Play.

Added: October 25, 2018
image from The Betterly Report Cyber Privacy Insurance Market Survey

The Betterly Report Cyber Privacy Insurance Market Survey

An annual review and evaluation of insurance products designed to protect against the unique risks of data security for organizations.

(more available)
Added: October 25, 2018
image from The CIO's Triple Threat Guide To Care Team Communication

The CIO's Triple Threat Guide To Care Team Communication

This report seeks to discuss the issues related to archaic communication devices in the hospital setting. It hopes to provide assistance for the security issues related to updating communication systems.

(more available)
Added: October 25, 2018
image from Uber: Security Risks Come Along With Your Ride

Uber: Security Risks Come Along With Your Ride

Appthority analyzed the security risks of the Uber app and its integration with other apps in this quarter’s enterprise mobile threat update. What they found may surprise you.

(more available)
Added: October 25, 2018
image from Understanding the Depth of the Global Ransomware Problem

Understanding the Depth of the Global Ransomware Problem

This report presents the results of a survey undertaken in the United States, Canada, Germany and the United Kingdom on ransomware and related issues. The survey was conducted during June 2016 with 165 organizations in the United States, and 125 each in the other nations for a total of 540 surveys completed.

(more available)
Added: October 25, 2018
image from Vendor Landscape Cloud Workload Security Solutions

Vendor Landscape Cloud Workload Security Solutions

As businesses continue to adopt both infrastructure-as-a-service (iaaS) and platform -as-a-service (PaaS) cloud platforms, S&r pros struggle to protect their organization’s valuable data while minimizing the threat surface of cloud and hybrid cloud workloads. Cloud workload security (CWS) solutions provide automated and layered controls to secure configurations, network, applications, and storage of hybrid cloud hypervisors and workloads. this report provides S&r pros with an overview of the CWS vendor landscape, critical selection criteria, and key vendor differentiation.

(more available)
Added: October 25, 2018
image from 2014 Trustwave Global Security Report

2014 Trustwave Global Security Report

Subtitled “Cyber Attacks: Can the Market Respond?”

Added: October 24, 2018
  • ««
  • «
  • 31
  • 32
  • 33
  • 34
  • 35
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 26, 2025 12:09 UTC (build b1d7be4)