Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Internet Trends 2017 Code Conference

Internet Trends 2017 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 20, 2018
image from JWT Handbook

JWT Handbook

Ever wondered how JWT came to be and what problems it was designed to tackle? Are you curious about the plethora of algorithms available for signing and encrypting JWTs? Or are you interested in getting up-to-speed with JWTs as soon as possible? Then this handbook is for you.

(more available)
Added: October 20, 2018
image from McAfee Labs Threats Report June 2018 Infographic

McAfee Labs Threats Report June 2018 Infographic

This is the infographic based on the threat report of the same name.

Added: October 20, 2018
image from Mobile Phishing Report 2018

Mobile Phishing Report 2018

This whitepaper looks at the evolution of mobile phishing - examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.

(more available)
Added: October 20, 2018
image from Mobile Security Report: 2017 Spotlight Report

Mobile Security Report: 2017 Spotlight Report

This mobile security report provides insights into the events of 2017.

Added: October 20, 2018
image from Prepare For The Growing Threats Of Mobile Security

Prepare For The Growing Threats Of Mobile Security

This review of the events of 2016, seeks to offer insight into the future of 2017.

Added: October 20, 2018
image from Ransomware Response:Ideal vs. Reality

Ransomware Response:Ideal vs. Reality

From the Report, “This newsletter introduces the latest ransomware trends and best practices for ransomware response using the AhnLab MDS (Malware Defense System). "

(more available)
Added: October 20, 2018
image from Ransomware: Many Victims Few Solutions Infographic

Ransomware: Many Victims Few Solutions Infographic

This infographic takes a look at Ransomware and provides a brief overview of discusses some solutions.

Added: October 20, 2018
image from Secure Mobile Development Best Practices

Secure Mobile Development Best Practices

This guide gives specific recommendations to use during your development process. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your apps more secure.

(more available)
Added: October 20, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2016)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2016)

October 2016 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 20, 2018
image from Swearing Trojan Overview

Swearing Trojan Overview

This is an overview of the Swearing Trojan infecting mobile banking.

Added: October 20, 2018
image from The Art Of Organizing And Simplifying IT Support

The Art Of Organizing And Simplifying IT Support

Learn easy and effective ways for IT pros to manage help desk tickets and simplify the job of supporting end-users.

(more available)
Added: October 20, 2018
image from The Criminal Justice Information Services Compliance For Mobile Devices

The Criminal Justice Information Services Compliance For Mobile Devices

This is a guide to the Criminal Justice Information Services Compliance For Mobile Devices.

Added: October 20, 2018
image from The Path To Rapid GDPR Compliance

The Path To Rapid GDPR Compliance

This white paper looks at some insights into the journey of reaching compliance with the GDPR and its May 2018 deadline. It seeks to share best practice guidelines for all businesses that have clients in Europe.

(more available)
Added: October 20, 2018
image from The Ransomware Economy

The Ransomware Economy

This paper discusses the How and Why the Dark Web Marketplace for Ransomware Is Growing at a Rate of More Than 2,500% Per Year

(more available)
Added: October 20, 2018
image from VIGOR: Interactive Visual Exploration of Graph Query Results

VIGOR: Interactive Visual Exploration of Graph Query Results

This research takes a look at mining visual graphs and analyzes the value of that activity.

Added: October 20, 2018
image from Vulnerability Review

Vulnerability Review

The annual Vulnerability Review analyzes the evolution of software security from a vulnerability perspective. The review presents global data on the prevalence of vulnerabilities and the availability of patches, maps the security threats to IT infrastructures, and also explores vulnerabilities in the 50 most popular applications on private PCs.

(more available)
Added: October 20, 2018
image from Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

This paper takes a look at the cities of the west, and the cyber threats that occurred there.

Added: October 20, 2018
image from 2015 Vulnerability Review

2015 Vulnerability Review

Published in March of 2015, this report reviews the key figures and facts on vulnerabilities from a global information security perspective.

(more available)
Added: October 19, 2018
image from 2016 Mobile Security Report

2016 Mobile Security Report

From the report, “We present this report, gleaned from our database of mobile security intelligence, to help IT and security pros make informed decisions about managing and securing mobile devices, mobile apps, and their enterprises’ mobile ecosystem.”

(more available)
Added: October 19, 2018
image from 4th Annual State of Application Security Report (2015 Mid-Year Report)

4th Annual State of Application Security Report (2015 Mid-Year Report)

Arxan and iThreat Cyber Group (ICG) analyzed data collected by ICG over the past 3.5 years that looked at the distribution of pirated software and digital assets on the Dark Web (i.e., the portion of content on the World Wide Web that is not indexed by standard search engines) and indexed sites that are focused on distributing pirated releases.

(more available)
Added: October 19, 2018
  • ««
  • «
  • 40
  • 41
  • 42
  • 43
  • 44
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 23, 2025 08:08 UTC (build b1d7be4)