Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Shelltea + Poslurp Memory-Resident Point-Of-Sale Malware Attacks Industry

Shelltea + Poslurp Memory-Resident Point-Of-Sale Malware Attacks Industry

This paper discusses the specific issue of malware that attacks Point-Of-Sale systems.

Added: October 24, 2018
image from Standing Up To Cryptojacking: Best Practices For Fighting Back

Standing Up To Cryptojacking: Best Practices For Fighting Back

In this paper, they explore the differences between legitimate mining and cryptojacking; how cryptojacking works; the costs of cryptojacking to today’s organizations; and practical steps you can take to avoid being a victim of cryptojacking.

(more available)
Added: October 24, 2018
image from The 5 Most Vulnerable Patient Handoff Scenarios

The 5 Most Vulnerable Patient Handoff Scenarios

Hospital communications have a major breakdown in patient handoff due to archaic communication devices. This report seeks to help solve that problem, while also discussing the security issues related to the new communication devices.

(more available)
Added: October 24, 2018
image from The Continuum Of Cloud Native Topologies

The Continuum Of Cloud Native Topologies

This report gives a clever way to understand Cloud security topologies. It breaks all of the concepts down into a simple continuum.

(more available)
Added: October 24, 2018
image from The Impact Of Customer Journey Hijacking Q4 2017

The Impact Of Customer Journey Hijacking Q4 2017

This report provides an overview of online journey hijacking based on an analysis of 500 million page views per day from top e-commerce sites across all product categories.

(more available)
Added: October 24, 2018
image from The Importance Of Knowing Your Device In A Mobile-First World

The Importance Of Knowing Your Device In A Mobile-First World

This white paper will examine “Know Your Device” (KYD) as a method to not only protect against fraud, but also enhance your customer’s digital channel experiences and compete in a crowded marketplace.

(more available)
Added: October 24, 2018
image from The Internet Of Things Requires A Security Rethink

The Internet Of Things Requires A Security Rethink

This paper takes a good look at the new era that is being ushered in by the Internet Of Things. It discusses the “perfect storm” that is being created by the issues and innovations ahead.

(more available)
Added: October 24, 2018
image from The State Of Application Survey 2018

The State Of Application Survey 2018

Before slowing down development and causing customers to revolt, security and risk pros should read this report to understand the current state of application security and how emerging techniques support the speed your business needs.

(more available)
Added: October 24, 2018
image from Threat Advisory: betFIRST mobile apps

Threat Advisory: betFIRST mobile apps

This is a threat advisory for betFIRST mobile apps

Added: October 24, 2018
image from Understanding The Mobile Threat Landscape In 2018

Understanding The Mobile Threat Landscape In 2018

“2017 was a huge year for mobile security. Malicious actors returned with a vengeance and cyber attacks grew rapidly in sophistication. Ransomware outbreaks like WannaCry and Petya hit enterprises globally causing unparalleled disruption, new vulnerabilities like BlueBorne were discovered and malware variants grew more aggressive and prevalent by the day. This report will summarise the key mobile security trends that emerged in 2017, and summarise thoughts for the mobile threat landscape for the year ahead.”

(more available)
Added: October 24, 2018
image from Using cyber analytics to help you get on top of cybercrime: Third-generation Security Operations Centers

Using cyber analytics to help you get on top of cybercrime: Third-generation Security Operations Centers

As the threatscape continues to evolve rapidly in both sophistication and scale, the need to protect organizations’ intellectual property, operations, brand and shareholder value, in addition to their customers’ data, is ever more critical. But how do organizations build controls for the security risks they don’t even know about yet?

(more available)
Added: October 24, 2018
image from Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

Whaling Anatomy Of An Attack: Protecting Your Organization From CEO Email Scams

This book takes a look at “whaling” scams. Or largescale phishing attacks. It offers some analysis and insight into how these scams can be avoided.

(more available)
Added: October 24, 2018
image from When Next-Gen AV Meets EDR: Overpowering Advanced Threats

When Next-Gen AV Meets EDR: Overpowering Advanced Threats

Overpowering today’s attackers and responding to threats requires EDR plus NGAV. The bad guys treat all of an organization’s machines as possible entry points. EDR plus NGAV takes this concept and uses it to the defender’s advantage by using all of a company’s endpoints for protection.

(more available)
Added: October 24, 2018
image from 2015 PCI Compliance Report

2015 PCI Compliance Report

Subtitled “Insight for helping businesses manage risk through payment security”

Added: October 23, 2018
image from 2016 Threat Predictions

2016 Threat Predictions

This report deals with predicting the cyber threat landscape for 2016 through 2020. It does this by looking back 5 years, and analyzing the past, and also talking to folks who make predictions for the 5 years in the future.

(more available)
Added: October 23, 2018
image from 2017 Ransomware Defense Survey

2017 Ransomware Defense Survey

Some statistics that jump out from this report, 76% of respondents see ransomware as significant business threat, 52% rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems, 57% say they are more likely to be a ransomware target in 2017.

(more available)
Added: October 23, 2018
image from 2018 Sonicwall Cyber Threat Report

2018 Sonicwall Cyber Threat Report

Subtitled, “Threat Intelligence, Industry Analysis, and Cybersecurity Guidance, for the Global Cyber Arms Race,” this report seeks to fully disclose the research done by the authors, in order to aid all of those involved in the cybersecurity realm.

(more available)
Added: October 23, 2018
image from 6 Principles For DevOps Security At Scale

6 Principles For DevOps Security At Scale

DevOps and security leaders recognize that DevOps requires a fresh approach to security that mitigates risk and uncertainty without impairing velocity. This e-book presents six guiding principles for enabling DevOps security at scale.

(more available)
Added: October 23, 2018
image from Best Practices For Digital Data Security: Cybersecurity Recommendations For The Business Traveler

Best Practices For Digital Data Security: Cybersecurity Recommendations For The Business Traveler

This whitepaper takes a look at the cybersecurity considerations that a business traveler should keep in mind while on the move.

(more available)
Added: October 23, 2018
image from Cloud Hard 2018 Security With A Vengeance

Cloud Hard 2018 Security With A Vengeance

In partnership with the Information Security Community, Bitglass surveyed over 570 cybersecurity and IT professionals to learn how organizations are approaching cloud security. Read on to learn about the state of traditional tools, security measures IT leaders are taking, and cloud priorities for 2018.

(more available)
Added: October 23, 2018
image from Consumer Account Security Report 2016

Consumer Account Security Report 2016

The report describes consumers’ account security practices, their exposure to security incidents and their expectations for companies to protect their mobile and online accounts. Data are drawn from an online survey of 1,300 adults conducted in September 2016.

(more available)
Added: October 23, 2018
  • ««
  • «
  • 33
  • 34
  • 35
  • 36
  • 37
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 26, 2025 04:08 UTC (build b1d7be4)