Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The purpose of this research is to examine trends in the benefits of threat intelligence and the challenges companies face when integrating threat intelligence with existing security platforms and technologies.

(more available)
Added: October 23, 2018
image from Threat Advisory: Anato

Threat Advisory: Anato

This is a threat advisory for Anato

Added: October 23, 2018
image from Threat Advisory: Tiscali App

Threat Advisory: Tiscali App

This is a threat advisory for the Tiscali App.

Added: October 23, 2018
image from Threat Intelligence Executive Report 2017: Volume 1

Threat Intelligence Executive Report 2017: Volume 1

This Threat Report takes a look at some of the events of Early 2017. Specifically, it looks at how weak and outdated software enabled breaches, threats leveraged legitimate features, threat groups targeted organizations for espionage, and Shamoon wiper malware re-emerged.

(more available)
Added: October 23, 2018
image from United Endpoint Management: The Next Step In The Evolution Of Device Management

United Endpoint Management: The Next Step In The Evolution Of Device Management

This paper provides a simple summary of Endpoint Management and why it is necessary and helpful.

Added: October 23, 2018
image from What A Hacker Sees: Top 20 CIS Critical Security Controls

What A Hacker Sees: Top 20 CIS Critical Security Controls

This paper discusses the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC) come into play, providing organizations with 20 key controls that they can implement to mitigate some of the threats they are facing.

(more available)
Added: October 23, 2018
image from 2016 Global Threat Report

2016 Global Threat Report

The Forcepoint 2016 Global Threat Report is a definitive breakdown of many of today’s most impactful cybersecurity threats with far-reaching technical, operational and cost impacts on affected organizations. Each section of this report closes with guidance from the Forcepoint Security Labs team on how to best address the outlined threat(s).

(more available)
Added: October 22, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The goal of the SonicWall Annual Threat Report is to define the cybersecurity battlefield in order to enable companies and individuals around the world to mount an impenetrable defense in 2017 and beyond.

(more available)
Added: October 22, 2018
image from 2017 Cybersecurity Threat Insights Report For Leaders

2017 Cybersecurity Threat Insights Report For Leaders

From the report, “When we set out to develop a report based on our 163 incident response client engagements over the course of the first half (H1) of 2016, we captured empirical data on type of threats, affected industries, and initial access vectors that threats use. However, we went back to the drawing board to ask ourselves, “What do organizations challenged by cyber threats and cyber risk actually need to know?” As a result, this report takes the form of an advisory aimed at jarring Security and C-Suite leaders just enoug to evoke positive action and a recalibration of their approaches to security.”

(more available)
Added: October 22, 2018
image from 2017 Security Annual Volume 1

2017 Security Annual Volume 1

This paper was written for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams.

(more available)
Added: October 22, 2018
image from 2017 Security Report

2017 Security Report

This report takes a look at the last 20 years of IT development, and the issues and trends that have taken place in 2017.

(more available)
Added: October 22, 2018
image from 5G Security Architecture White Paper

5G Security Architecture White Paper

From the report, “We are now seeing the first incarnations of 5G technology. It provides many capabilities that make it a preferred platform for the digitalized world. Solid security is one of the strengths of 4G networks and the same is expected from 5G. This cannot, however, be achieved just by adapting 4G security features to 5G system because the 5G service palette is more than just an extension from that of 4G. Completely new security functionalities and services are needed in addition to enhanced versions of 4G security features.”

(more available)
Added: October 22, 2018
image from 6 Key Use Cases For Securing Your Organizations Cloud Workloads

6 Key Use Cases For Securing Your Organizations Cloud Workloads

This ebook lays out several examples of how to effectively secure your cloud workloads.

Added: October 22, 2018
image from 7 Best Practices For Cybersecurity

7 Best Practices For Cybersecurity

This is a helpful little report that simplifies the best practices for Cybersecurity.

Added: October 22, 2018
image from An Analysis Of Exposed IoT Technologies in China

An Analysis Of Exposed IoT Technologies in China

From the paper, “In terms of the technical roadmap, and considering the great differences between China and international IoT systems and products, this paper mainly analyzes IoT assets in China and describes their exposure. This helps illustrate what IoT devices and services are accessible on the Internet and their potential security problems, with the purpose of raising the public awareness of defending IoT.”

(more available)
Added: October 22, 2018
image from AWS vs. Azure vs. Google: 10 Ways To Choose The Right DataCloud Center For You

AWS vs. Azure vs. Google: 10 Ways To Choose The Right DataCloud Center For You

This is an e-Book that provides 10 ways to pick the right datacloud center.

Added: October 22, 2018
image from China Country Profile 2017

China Country Profile 2017

This paper gives a profile of China.

Added: October 22, 2018
image from CISO Tips: Balancing the hero with the storyteller

CISO Tips: Balancing the hero with the storyteller

There’s no clear and direct career path to the role of infosec executive. But, there are skills that can help you advance your career to the management level, such as deep technical knowledge, strong communication skills and having business acumen.

(more available)
Added: October 22, 2018
image from Cloud Adoption and Risk Report 2016 Q4

Cloud Adoption and Risk Report 2016 Q4

In this report, we detail the types of sensitive data stored in cloud services, how that data is shared within organizations and with third parties, and how risky employee behavior can expose data. We also examine the external threats that use the cloud to exfifiltrate sensitive data pilfered from on-premises systems as well as attacks directed at sensitive data stored in cloud services. Finally, we cover general usage trends including the top most widely used cloud services.

(more available)
Added: October 22, 2018
image from Connected Healthcare: The Cybersecurity Threat Is Real And Impending

Connected Healthcare: The Cybersecurity Threat Is Real And Impending

This report discusses why it is important to protect medical device apps “in the wild”.

Added: October 22, 2018
image from Cyber Insurance Survey 2014

Cyber Insurance Survey 2014

This report is laid out as follows: Section I focuses on the current prevalence of cyber security insurance and the policy forms it takes. Section II discusses the current structure of the cyber security market. Section III investigates perceptions of the significance, risks, and challenges of cyber security insurance. Section IV details responding company demographics. Section V describes demographic characteristics of the respondents.

(more available)
Added: October 22, 2018
  • ««
  • «
  • 35
  • 36
  • 37
  • 38
  • 39
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 25, 2025 12:09 UTC (build b1d7be4)