Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from What iOS11 Means To The Enterprise

What iOS11 Means To The Enterprise

This report offers insight into iOS11 and how Apple technology is providing useful resources to enterprises that are moving away from PC’s.

(more available)
Added: October 21, 2018
image from 2015 Cyber Security Survey: Major Australian Businesses

2015 Cyber Security Survey: Major Australian Businesses

A report that was created by the 2015 Australian Cyber Security Centre (ACSC) Cyber Security Survey of major Australian businesses was conducted to obtain a better picture of Australian organisations’ understanding of cyber threats and how they are positioned to secure their networks.

(more available)
Added: October 20, 2018
image from 2017 Cyberthreat Defense Report

2017 Cyberthreat Defense Report

This report hopes to help IT security decision makers gain a better understanding of how their perceptions, concerns, priorities, and defenses stack up against those of other IT security professionals and their organizations. Applied constructively, the data, analyses, and findings covered here can be used by diligent IT security teams to shape answers to many important questions.

(more available)
Added: October 20, 2018
image from 2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

This report provides complete survey reports, expert analysis, and thoughts from leading experts in the field.

Added: October 20, 2018
image from 21st CEO Survey: The Anxious Optimist In The Corner Office

21st CEO Survey: The Anxious Optimist In The Corner Office

This survey report offers insights into the thoughts and experiences of CEO’s including what threats keep them up at night.

(more available)
Added: October 20, 2018
image from A Primer On File-Borne Malware Threats

A Primer On File-Borne Malware Threats

This paper will examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.

(more available)
Added: October 20, 2018
image from A Unified Approach To Rugged Device Management

A Unified Approach To Rugged Device Management

This whitepaper will delve into the evolution of rugged devices, the management challenges associated with such deployments, and how a UEM solution can address these challenges to enable a fully connected environment that is both manageable and secure.

(more available)
Added: October 20, 2018
image from AndroRATIntern: A Japanese Mobile Threat With Global Implications For Mobile Data Security

AndroRATIntern: A Japanese Mobile Threat With Global Implications For Mobile Data Security

This report provides an exclusive look at a very particular Trojan that has appeared out of Japan.

Added: October 20, 2018
image from Building Technology Infrastructure For Learning

Building Technology Infrastructure For Learning

This report from the Department Of Education provides insight into good technoglogy infrastructure for educational purposes.

Added: October 20, 2018
image from Coporate IT Security Risks Special Report Series 2016

Coporate IT Security Risks Special Report Series 2016

In order to find out more about the challenges and threats businesses are encountering, Kaspersky Lab, together with B2B International, has conducted a study entitled Corporate IT Security Risks Survey 2016. We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyber threats.

(more available)
Added: October 20, 2018
image from Cyber Value at Risk

Cyber Value at Risk

This paper was written to help Enterprises prioritize cyber security activities in real time based on potential financial loss.

Added: October 20, 2018
image from CyberThreat Report: The Malware Wars Are Heating Up

CyberThreat Report: The Malware Wars Are Heating Up

The purpose of this report is to help businesses better understand the risks that they are facing. This report asks businesses to be mindful that they should take the new security landscape seriously.

(more available)
Added: October 20, 2018
image from DDoS Trends Report Q4 2016

DDoS Trends Report Q4 2016

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign. It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q4 2016.

(more available)
Added: October 20, 2018
image from Detection Survey Infographic

Detection Survey Infographic

This infographic offers a summary of survey points that sought to answer what is causing the spike in detection investment.

(more available)
Added: October 20, 2018
image from eCommerce Threats Of 2018

eCommerce Threats Of 2018

This report discusses the malicious Bots in 2018 and how they can impact the eCommerce sector.

Added: October 20, 2018
image from Email Archiving: It's Time For An Update

Email Archiving: It's Time For An Update

This report offers a guide to understanding the importance of email archiving.

Added: October 20, 2018
image from Exposing The Enemy Within

Exposing The Enemy Within

This e-Book takes a look at what your DNS can tell you about your security Posture.

Added: October 20, 2018
image from Fighting File Based Exploits Across The Expanding Attack Surface

Fighting File Based Exploits Across The Expanding Attack Surface

This report provides insight into taking a proactive approachv against known, unkown, and zero-day exploits that serve as the starting point for multi-vector cyberattacks.

(more available)
Added: October 20, 2018
image from German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

This paper takes a look at the cities of Germany, and the cyber threats that occurred there.

Added: October 20, 2018
image from Impact vs. Metasplout Pro Efficiency Study

Impact vs. Metasplout Pro Efficiency Study

Under most tested scenarios, Core Impact users can expect a notable reduction in both operator time and total elapsed time when performing common penetration testing tasks. This whitepaper presents the repeatable methodology and testing protocol used in our study.

(more available)
Added: October 20, 2018
image from Internet Security Threat Report Volume 23

Internet Security Threat Report Volume 23

This paper explores threats like coin-mining attcks, spike in software supply-chain attacks, the ransomware business, the drop in zero days, and the rise in mobile malware.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 39
  • 40
  • 41
  • 42
  • 43
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 23, 2025 08:08 UTC (build b1d7be4)