Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Enterprise Mobile Security Pulse Report Q4 2017

Enterprise Mobile Security Pulse Report Q4 2017

The Appthority Enterprise Mobile Security Pulse Report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during our deep app analysis.

(more available)
Added: October 22, 2018
image from GDPR An Action Plan For Cloud Readiness

GDPR An Action Plan For Cloud Readiness

This E-Book discusses ways to become GDPR Compliant.

Added: October 22, 2018
image from GTIC Monthly Threat Report October 2017

GTIC Monthly Threat Report October 2017

This monthly threat report takes a look at the month of October 2017. More specifically, it takes a look at the shift in Phishing campaigns, the WIFI WPA Security VULN, and a variety of other threats.

(more available)
Added: October 22, 2018
image from Has The Enforcer Become The Enabler?

Has The Enforcer Become The Enabler?

This paper talks about what the next evolution of Data Loss Prevention technology means for business collaboration and productivity.

Added: October 22, 2018
image from Healthcare Apps In The BYOD World

Healthcare Apps In The BYOD World

This white paper reviews the current state of healthcare apps and device-centric mobile application management, then offers an improved, app-centric approach to mobile security.

(more available)
Added: October 22, 2018
image from How Collaboration Can Optimize Security Operations

How Collaboration Can Optimize Security Operations

The executive summary of this report says, “The secret to advanced threat preparedness may actually lie within your organization — your current people, processes and technologies…Enterprises are coming to the realist that a fragmented or compartmentalized security operations design is ineffective against today’s advanced security threats.”

(more available)
Added: October 22, 2018
image from Incident Response Reference Guide

Incident Response Reference Guide

This Guide aims to help businesses have a good response to cyber threat incidents.

Added: October 22, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration.

(more available)
Added: October 22, 2018
image from Know Your Data To Create Actionable Policy

Know Your Data To Create Actionable Policy

Too often, security and risk (S&R) leaders create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data — from what data they have to where it resides. As a result, many policies are ineffective and can even hinder business processes. In today’s evolving data economy, data identity is the missing link that S&R leaders must define to create actionable policy. This report was designed to help S&R leaders develop effective policies using their Data Security And Control Framework as a guideline.

(more available)
Added: October 22, 2018
image from Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology.

(more available)
Added: October 22, 2018
image from Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

This report offers insight into the cyber events of 2015 and makes predictions for 2016 - 2019.

Added: October 22, 2018
image from Mobile Threat Report Q3 2017

Mobile Threat Report Q3 2017

This report provides insights into the security events in mobile threats from the 3rd quarter of 2017

Added: October 22, 2018
image from Multi-Factor Authentication For Dummies

Multi-Factor Authentication For Dummies

This e-book provides a helpful and simple explanation of Multi-Factor Authentication.

Added: October 22, 2018
image from Practitioner’s Guide to Building a Security Operations Center (SOC)

Practitioner’s Guide to Building a Security Operations Center (SOC)

This white paper goes into detail about what is needed to build and maintain an SOC, the types of technologies and skillsets required, and advantages of an all-in-one security monitoring platform.

(more available)
Added: October 22, 2018
image from Privileged Access Security For Dummies

Privileged Access Security For Dummies

This is a handy and simple guide for helping individuals understand and implement Privileged Access Security.

Added: October 22, 2018
image from Recorded Future for SOC Teams Lab Test

Recorded Future for SOC Teams Lab Test

Details research regarding the company Recorded Future. Shows how this company aided in the effeciency of dealing with cyber attacks and threats.

(more available)
Added: October 22, 2018
image from Regional Advanced Threat Report: Asia Pacific H1 2015

Regional Advanced Threat Report: Asia Pacific H1 2015

This report discusses trends in the cyber security environment in Asia Pacific from January to June 2015.

Added: October 22, 2018
image from Securing A Digital Retail Enterprise

Securing A Digital Retail Enterprise

This whitepaper explores the necessary steps for securing a retail enterprise in a digital world.

Added: October 22, 2018
image from Sensitive Data At Risk:The SANS 2017 Data Protection Survey

Sensitive Data At Risk:The SANS 2017 Data Protection Survey

This report is based on a survey that sought to see how organizations were protecting their data.

Added: October 22, 2018
image from Social Engineering:How The Human Factor Puts Your Company At Risk

Social Engineering:How The Human Factor Puts Your Company At Risk

Positive Technologies regularly performs assessment of information security awareness among employees at major companies all over the world. This report provides statis- tics and analysis from 10 most instructive testing projects in 2016 and 2017, including examples of successful attacks against employees. These projects are based on various social engineering techniques and generally included emails, phone conversations, and communication via social networks.

(more available)
Added: October 22, 2018
image from The Current State Of Mobile Malware

The Current State Of Mobile Malware

This report will take you through the most common malware infection vectors, the different types of mobile malware currently plaguing organizations, and how to take the appropriate steps to protect your mobile estate.

(more available)
Added: October 22, 2018
  • ««
  • «
  • 36
  • 37
  • 38
  • 39
  • 40
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 25, 2025 12:09 UTC (build b1d7be4)