Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

IBM Resilient and Ponemon Institute are pleased to release the findings of the study on the importance of cyber resilience for a strong security posture. We surveyed more than 413 IT and IT security professionals in the UK1, Only 25 percent of respondents say their organisation has a high level of cyber resilience. According to the findings, 71 percent of respondents believe their organisation is not prepared to recover from cyber attacks.

(more available)
Added: October 22, 2018
image from The State Of Industrial Cybersecurity 2018

The State Of Industrial Cybersecurity 2018

The present trend study “The State of Industrial Cybersecurity 2018” seeks to answer the questions, what do use companies really want? What Are their priorities, and what concerns and challenges do they face? What external and internal factors are impacting industrial cybersecurity? What strategies and measures are being employed, now and in the future?

(more available)
Added: October 22, 2018
image from The Surge Of Cyber Threats: What Higher Education Needs To Know

The Surge Of Cyber Threats: What Higher Education Needs To Know

This report takes a specific look at cyber threats on the campuses of higher learning facilities.

Added: October 22, 2018
image from Threat Monitoring Detection Response Report 2017

Threat Monitoring Detection Response Report 2017

This study is a summary of responses from over 400 cybersecurity professionals to provide a comprehensive snapshot on the evolving threat landscape, insider and external threats, preventative measures, threat monitoring and data collection, threat intelligence, threat detection, threat hunting, threat analytics, incident response, and incident recovery.

(more available)
Added: October 22, 2018
image from Three-Part Guide To Developing A BYOD Strategy

Three-Part Guide To Developing A BYOD Strategy

This paper is subtitled “An IT Architect’s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy”

Added: October 22, 2018
image from To The Point: Reporting Cybersecurity and IT Risk to the Board

To The Point: Reporting Cybersecurity and IT Risk to the Board

This report provides helpful insight into why board executives don’t understand Cybersecurity issues. It also adds helpful advice for how to convince the board of the importance of these issues.

(more available)
Added: October 22, 2018
image from Tripwire State Of Cyber Hygiene Report 2018

Tripwire State Of Cyber Hygiene Report 2018

This report illustrates how organizations are implementing proper Cyber hygiene, if at all. To gather this data, Tripwire partnered with Dimensional Research, sending a survey to independent sources of IT security professionals. The survey was completed by 306 participants in July 2018, all of whom are responsible for IT security at companies with more than 100 employees.

(more available)
Added: October 22, 2018
image from Virtualization's Hidden Traps

Virtualization's Hidden Traps

This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany.

(more available)
Added: October 22, 2018
image from 2017 Cloud Security Report

2017 Cloud Security Report

This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others.

(more available)
Added: October 21, 2018
image from 2017 Security Annual Volume 2 - Luminary Interviews

2017 Security Annual Volume 2 - Luminary Interviews

This paper provides interviews with a variety of well known individuals in the cyber security industry.

Added: October 21, 2018
image from 2018 CyberThreat Defense Report

2018 CyberThreat Defense Report

This report advertises itself as a “vendor-agnostic” report. Now in its fifth year, this report has become a staple among IT security leaders and practitioners. They stick to the usual suspects in cyber threats, but also outline some new areas related to Cloud investment, app containers, reliance on mobile devices, and the continuing damage of ransomware.

(more available)
Added: October 21, 2018
image from 2018 Gambling Report

2018 Gambling Report

iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018.

(more available)
Added: October 21, 2018
image from 5th Annual State of Application Security Report

5th Annual State of Application Security Report

Arxan’s 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality

Added: October 21, 2018
image from 6 Key Security Requirements for Next Generation Mobile Networks

6 Key Security Requirements for Next Generation Mobile Networks

Mobile network operators (MNOs) are evolving rapidly to deploy transformative networks—4G, 5G, SDN/NFV. Meanwhile they are battling a new and different cyber attack landscape that could compromise BOTH their networks AND their subscribers. Network and subscriber protection are no longer separate problems in this new digital age. Legacy security solutions are inadequate. A new approach to security is needed—with a focus on PREVENTION —not just a reaction to prior known threats. Adopting a prevention posture enables operators to get ahead of the evolving sophistication of attackers.

(more available)
Added: October 21, 2018
image from Accelerate: State Of DevOps Strategies For A New Economy

Accelerate: State Of DevOps Strategies For A New Economy

This report examines the impact that cloud adoption, use of open source software, organizational practices (including outsourcing), and culture all have on software delivery performance.

(more available)
Added: October 21, 2018
image from Banking On The Customer To Make Open Banking A Success

Banking On The Customer To Make Open Banking A Success

This paper offers a unqiue look into the complications surrounding that adoption of compliant banking solutions. It seeks to help create simple but compliant solutions that customers accept.

(more available)
Added: October 21, 2018
image from Bring Mac To The Enterprise With A Modern Approach To Management

Bring Mac To The Enterprise With A Modern Approach To Management

This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.

(more available)
Added: October 21, 2018
image from DDoS Threat Report Q3 2017

DDoS Threat Report Q3 2017

This report takes a look at the DDoS threats that occurred in the third quarter of 2017.

Added: October 21, 2018
image from Dealing With The New EU GDPR

Dealing With The New EU GDPR

This paper takes a look at the GDPR and asks if your organization is ready for it.

Added: October 21, 2018
image from Email Encryption Secure File Transfer Best Practice

Email Encryption Secure File Transfer Best Practice

This report provides a discussion about the best practices for Email encryption.

Added: October 21, 2018
image from ENISA Threat Taxonomy: A tool for structuring threat information.pdf

ENISA Threat Taxonomy: A tool for structuring threat information.pdf

The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015. The consolidated threat taxonomy is an initial version: in 2016, ENISA plans to update and expand it with additional details, such as definitions of the various threats mentioned.

(more available)
Added: October 21, 2018
  • ««
  • «
  • 37
  • 38
  • 39
  • 40
  • 41
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 23, 2025 20:08 UTC (build b1d7be4)