Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from 2015 Polish Internet Security Landscape

2015 Polish Internet Security Landscape

This is a yearly report based on the activities of CERT Polska for the year 2015. Polish authorities, well aware of the dangers, commissioned this report containing proposals for the organization of the defenses system of the syberspace of the Republic of Poland.

(more available)
Added: October 24, 2018
image from 2017 AWS Cloud Data Protection Survey

2017 AWS Cloud Data Protection Survey

Druva performed an AWS cloud migration survey in November 2017 to get a clearer picture of how organizations are utilizing the AWS service for secondary storage, data protection, and archiving. This survey was conducted across more than 20 industries by IT professionals within multiple roles across the globe. They’ve highlighted our findings in this report.

(more available)
Added: October 24, 2018
image from 2017 Security Operations Center Survey

2017 Security Operations Center Survey

This report discusses the Security Operations Center and how it is being architected in organizations with some consensus on what should be done. The paper details the issues and problems that need to be resolved as this area of expertise continues to grow.

(more available)
Added: October 24, 2018
image from 2018 Phishing Trends And Intelligence Report: Hacking The Human

2018 Phishing Trends And Intelligence Report: Hacking The Human

The purpose of this report is to provide insight on significant industry trends, tools, and techniques being used by threat actors to carry out phishing attacks. It also sheds light on why shifts are occurring and what to expect in the coming year.

(more available)
Added: October 24, 2018
image from 2018 Security Report: Five Important Trends To Watch

2018 Security Report: Five Important Trends To Watch

This infographic provides a brief glimpse at the security report of the same name.

Added: October 24, 2018
image from CISO Insights: 7 Best Practices For A Successful Insider Threat Program

CISO Insights: 7 Best Practices For A Successful Insider Threat Program

In this report, 15 CISOs identified some practical steps that may help remedy some of the challenges many of organizations experience when developing and implementing an insider threat program.

(more available)
Added: October 24, 2018
image from Cybersecurity Insights Volume 2: The CEO's Guide To Securing The Internet Of Things

Cybersecurity Insights Volume 2: The CEO's Guide To Securing The Internet Of Things

This report tackles security issues related to the Internet Of Things.

Added: October 24, 2018
image from Database Discovery: Identifying Hidden Risks and Sensitive Data

Database Discovery: Identifying Hidden Risks and Sensitive Data

Keeping track of databases, and the associated data they host, turns out to be a significant challenge. This white paper presents a detailed approach to understanding the difficulties related to database discovery, and some solutions to those problems.

(more available)
Added: October 24, 2018
image from Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It

Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It

From the report, “We found the paradox of illicit, malicious activity juxtaposed with helpful customer service so interesting that we decided to evaluate the customer journeys of fi ve current ransomware families. From the fi rst ransom message to communicating with the criminals via their support channels, we wanted to see just how these gangs are doing with their customer journey – and whose is the best (or rather, least loathsome).”

(more available)
Added: October 24, 2018
image from How Personal Device Data Can Compromise Company Data

How Personal Device Data Can Compromise Company Data

Beginning with the Strava cyber incident, this paper seeks to provide insight into how personal device data can cause a crisis with company data.

(more available)
Added: October 24, 2018
image from IoT Security:An IBM Position Paper

IoT Security:An IBM Position Paper

This paper takes a look at how cognitive technologies will impact security in the IoT systems. It addresses a variety of issues related to CIoT and the future that lies ahead.

(more available)
Added: October 24, 2018
image from Marketscape Worldwide Cloud Security Gateways 2017 Vendor Assessment

Marketscape Worldwide Cloud Security Gateways 2017 Vendor Assessment

This report takes a look at Cloud Security Gateways and asks important questions that lead to proper vendor assesment.

Added: October 24, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of how mobile app security can be achieved through the technique of code injection.

(more available)
Added: October 24, 2018
image from Monthly Threat Report May 2017

Monthly Threat Report May 2017

This monthly threat report takes a look at the month of May 2017.

Added: October 24, 2018
image from National Exposure Index 2017

National Exposure Index 2017

From The Report, “This year, we continue this investigation into the risk of passive eavesdropping and active attack on the internet, and offer insight into the year-over-year changes involving these exposed services.”

(more available)
Added: October 24, 2018
image from Paradigm Shifts:TrendMicro Security Predictions For 2018

Paradigm Shifts:TrendMicro Security Predictions For 2018

This report offers Security Predictions for 2018

Added: October 24, 2018
image from Preparing For A Cyber Breach: Forewarned Is Forearmed

Preparing For A Cyber Breach: Forewarned Is Forearmed

This paper will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.

(more available)
Added: October 24, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

As stated in the report, “The purpose of this study is to shed light on the problem of medical data loss—how it is disclosed, who is causing it and what can be done to combat it.”

(more available)
Added: October 24, 2018
image from Ransomware: Unlocking The Lucrative Criminal Business Model

Ransomware: Unlocking The Lucrative Criminal Business Model

This is a well written exclusive look at Ransomware.

Added: October 24, 2018
image from Securing Information In The Age Of Collaboration

Securing Information In The Age Of Collaboration

This report presents the results of a survey run by ESG and commissioned by Seclore. They analyze information related to data, data security, and collaboration.

(more available)
Added: October 24, 2018
image from Securing The Modern Distributed Enterprise

Securing The Modern Distributed Enterprise

In this report they take a deeper look at the complexities of securing an organization and the role of digital transformation.

(more available)
Added: October 24, 2018
  • ««
  • «
  • 32
  • 33
  • 34
  • 35
  • 36
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 26, 2025 12:09 UTC (build b1d7be4)