Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from 6 Best Practices For Amazon Security Groups

6 Best Practices For Amazon Security Groups

This paper provides 6 Best Practices for Amazon Security Groups

Added: October 19, 2018
image from 9 Realities Of Data Protection In The 21st Century

9 Realities Of Data Protection In The 21st Century

This paper discusses how a portable and persistent data protection model can enable your business.

Added: October 19, 2018
image from A 360-Degree Guide To Choosing And Migrating To A New Email Client

A 360-Degree Guide To Choosing And Migrating To A New Email Client

This white paper seeks to offer some insight into migrating to a new email client.

Added: October 19, 2018
image from Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

From the report, “The Appthority Mobile Threat Team analyzed iOS apps in enterprise environments and found over 24,000 unique apps that access various types of user data, such as the calendar, bluetooth and photos, for advertising. These twenty-four thousand apps are just those that are up front with the user about requesting permission to access data for advertising purposes. Over 70% of enterprise environments contain these apps.”

(more available)
Added: October 19, 2018
image from Advanced Threat Report: Europe, the Middle East and Africa

Advanced Threat Report: Europe, the Middle East and Africa

This report provides you with unique insights into Europe, Middle East and Africa’s (EMEA’s) threat landscape for the second half of 2015.

(more available)
Added: October 19, 2018
image from ASEC Report Volume 88 Q3 2017

ASEC Report Volume 88 Q3 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 3rd Qtr. of 2017.

(more available)
Added: October 19, 2018
image from Biometrics: Introducing The Future Of Authentication

Biometrics: Introducing The Future Of Authentication

This report takes a look at Biometrics and how it can become a great cybersecurity measure.

Added: October 19, 2018
image from Business Perception Of IT Security: In The Face of An Inevitable Compromise

Business Perception Of IT Security: In The Face of An Inevitable Compromise

From The Report, “Evaluation of the business threat landscape can be broken down into two major areas: financial and technical. The former we covered extensively in our previous report, by measuring security budgets and recovery costs from typical threats. The next step is to take a closer look at real incidents that businesses have to deal with, and measures they take to prevent them.”

(more available)
Added: October 19, 2018
image from Control Business Data Risks Through End User Data Protection And Governance

Control Business Data Risks Through End User Data Protection And Governance

This Technology Spotlight examines the need for increased visibility and control to better manage and mitigate the risk presented by a decentralized corporate data environment.

(more available)
Added: October 19, 2018
image from Cyber Attack Trends: 2018 Mid Year Report

Cyber Attack Trends: 2018 Mid Year Report

In this 2018 Mid-Year Report, they take a look at how so far this year, the different strains of malware and their authors have proven to be capable of much more than previously imagined, with more sophistication and a new level of agility. Indeed, as seen in this analysis of the GrandCrab ransomware, malware is now rapidly adapting in real-time to the technology solutions offered by security vendors.

(more available)
Added: October 19, 2018
image from Cyberthreat Defense Report

Cyberthreat Defense Report

This docuement was created to Empower your organization to shift focus from protection to exploring new possibilities with a unified Lifecycle Defense.

(more available)
Added: October 19, 2018
image from Cyberthreat Report

Cyberthreat Report

This paper is based on a study that sought to understand the challenges associated with delivering web security, as well as to gauge receptivity to cloud-based web security solutions.

(more available)
Added: October 19, 2018
image from Data Breach Quick View - 2015 Year End Data Breach Trends

Data Breach Quick View - 2015 Year End Data Breach Trends

This research will take a look at how the ransomware types work, not just from a technological point of view but also from a psychological viewpoint. This report will also look at how these threats evolved, what factors are at play to make ransomware the major problem that it is today, and where ransomware is likely to surface next.

(more available)
Added: October 19, 2018
image from Dell Security Annual Threat Report 2016

Dell Security Annual Threat Report 2016

This annual report aims to help organizations prevent attacks.

Added: October 19, 2018
image from Five Reasons Why You Need Endpoint Backup

Five Reasons Why You Need Endpoint Backup

As its title states, this white paper provides five reasons why you need endpoint backup, specifically a centralized backup service.

(more available)
Added: October 19, 2018
image from French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

This paper takes a look at the cities of France, and the cyber threats that occurred there.

Added: October 19, 2018
image from Global Advanced Threat Landscape Survey 2018: Focus On DevOps

Global Advanced Threat Landscape Survey 2018: Focus On DevOps

The CyberArk Advanced Threat Landscape 2018 annual report is the 11th of its kind and will be released in three parts. This is part one, focusing on how privileged account security is incorporated into DevOps processes.

(more available)
Added: October 19, 2018
image from Global Cyberspace Is Safer Than You Think

Global Cyberspace Is Safer Than You Think

This paper argues that the level of security in cyberspace is actually far better than the picture described by media accounts and IT security reports.

(more available)
Added: October 19, 2018
image from Hospital Network Security Requirements:5 Steps Beyond Compliance

Hospital Network Security Requirements:5 Steps Beyond Compliance

As this report states, you can be compliant, but still not be secure. Read the 5 steps that can help make your hospital secure beyond the requirements for compliance.

(more available)
Added: October 19, 2018
image from Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

On behalf of the National Institute of Justice (NIJ) and as part of the Priority Criminal Justice Needs Initia- tive, the RAND Corporation, in partnership with the Police Executive Research Forum, organized a workshop in May 2017 on Challenges with Law Enforcement Access to Digital Evidence Held in Remote Data Centers. Discussions focused on ambiguities in U.S. law and procedure, challenges associated with using the Mutual Legal Assistance Treaty (MLAT) process, issues stemming from inadequate cooperation between law enforcement and service providers (the companies and organizations providing remote storage, communication, and computing services), and technical issues related to evidence residing in the cloud.

(more available)
Added: October 19, 2018
image from Internet Security Threat Report 2016

Internet Security Threat Report 2016

This report details 6 key findings from Symantec’s breakdown of the security issues of 2016.

Added: October 19, 2018
  • ««
  • «
  • 41
  • 42
  • 43
  • 44
  • 45
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 23, 2025 04:08 UTC (build b1d7be4)