Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Crossing The Last Mile Of IoT Security Cyber Risk

Crossing The Last Mile Of IoT Security Cyber Risk

This paper seeks to provide understanding and aid with meeting the unique information demands that the Internet of Things requires.

(more available)
Added: October 23, 2018
image from Definitive Guide To Ransomware

Definitive Guide To Ransomware

In this whitepaper, they explore the growing threat of ransomware and what you can do to keep your organization secure.

(more available)
Added: October 23, 2018
image from Enterprise Mobile: The New Threat Vector

Enterprise Mobile: The New Threat Vector

This paper discusses the new threat vector that has been created by bringing an enterprise into the mobile age.

Added: October 23, 2018
image from GDPR Advisory #1: Protecting The Pathways To Personal Information

GDPR Advisory #1: Protecting The Pathways To Personal Information

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 23, 2018
image from Is Data The New Endpoint

Is Data The New Endpoint

This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured.

(more available)
Added: October 23, 2018
image from Mobile Access Optimization And Security For The Cloud Era

Mobile Access Optimization And Security For The Cloud Era

This short e-Book takes a look at the unique problems that are caused by mobile access in the cloud era.

(more available)
Added: October 23, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of various mobile app security methods including per-app VPN, containers, and micro-segmentation.”

(more available)
Added: October 23, 2018
image from Next-Gen Endpoint Risks And Protections: A SANS Survey

Next-Gen Endpoint Risks And Protections: A SANS Survey

This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. Download this survey report to learn other key issues surrounding endpoint protection.

(more available)
Added: October 23, 2018
image from PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

While a data loss incident can be a disaster for an organization’s reputation, there is now a new imperative around inbound information as well. Unwanted data acquisition can create problems just as much as data leaving the organization. There are a couple of scenarios which should be considered. Read this paper to know more.

(more available)
Added: October 23, 2018
image from Prepare For Battle:Building An Incident Response Plan

Prepare For Battle:Building An Incident Response Plan

This report provides a walkthrough of creating an Incident Response Plan.

Added: October 23, 2018
image from Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

If you are looking for insight into the growing world of mobile payments, and the security surrounding those transactions, this paper is for you.

(more available)
Added: October 23, 2018
image from Quarterly Threat Summary Q1 2016

Quarterly Threat Summary Q1 2016

This Quarterly report offers key takeaways from the first Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 23, 2018
image from Security Analytics And Operations In Transition

Security Analytics And Operations In Transition

This report seeks to offer insight into the cybersecurity world and to analyze the dangers and pitfalls of the transition in the profession.

(more available)
Added: October 23, 2018
image from Security In The Golden Age Of Cybercrime

Security In The Golden Age Of Cybercrime

This paper offers insight into an exploration of network cybersecurity in the U.S. Federal Government.

Added: October 23, 2018
image from The CIO's Guide To Mobile Threat Defense

The CIO's Guide To Mobile Threat Defense

This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense.

Added: October 23, 2018
image from The Digital Business: Creating The Right IT Platform For Digital Transformation

The Digital Business: Creating The Right IT Platform For Digital Transformation

The purpose of this paper is to help CIOs and their boardroom colleagues find the right approach to building a digital infrastructure to achieve the right outcomes for their business.

(more available)
Added: October 23, 2018
image from The Fraud Beat 2016

The Fraud Beat 2016

This report discusses the reality that everyone is susceptible to fraudulent emails. It discusses why that is the case, and offers some solutions.

(more available)
Added: October 23, 2018
image from The IR Boost: How Threat Hunting Enhances Incident Response

The IR Boost: How Threat Hunting Enhances Incident Response

Whether it’s referred to as threat hunting or hunt teaming, companies are increasingly taking a proactive approach to security by looking for evidence of threats that are already in their environments. Organizations have realized that waiting for antivirus, SIEMs and other security solutions to trigger an alert is not a practical approach to detecting sophisticated and stealthy adversaries since they know how to evade these tools. Hunting enables security teams to proactively answer the question “Am I under attack?”

(more available)
Added: October 23, 2018
image from The ROPEMAKER Email Exploit

The ROPEMAKER Email Exploit

This threat advisory offers insight into the ROPEMAKER Email Exploit.

Added: October 23, 2018
image from The State of Online Privacy 2016

The State of Online Privacy 2016

This is a press release regarding a s study that finds more British Internet users are concerned about data privacy than losing their income.

(more available)
Added: October 23, 2018
image from The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

This paper takes a look at the best way to prevent breaches, by detecting and mitigating leaks.

Added: October 23, 2018
  • ««
  • «
  • 34
  • 35
  • 36
  • 37
  • 38
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 26, 2025 04:08 UTC (build b1d7be4)