Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Threat Landscape Report Q4 2017

Threat Landscape Report Q4 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 19, 2018
image from Thwarting The Tricksters Out To Get Your Money

Thwarting The Tricksters Out To Get Your Money

This small article discusses the importance of your organization getting ahead of phishing email campaigns.

Added: October 19, 2018
image from US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

This paper takes a look at the cities of the US, and the cyber threats that occurred there.

Added: October 19, 2018
image from World Economic Situations And Prospects: Update as of mid-2018

World Economic Situations And Prospects: Update as of mid-2018

The present document updates World Economic Situation and Prospects 2018 (United Nations publication, Sales No. E.18.II.C.2), released in December 2017.

(more available)
Added: October 19, 2018
image from 2015 State of Cybersecurity Leadership Report

2015 State of Cybersecurity Leadership Report

This paper was developed to help CISOs, CIOs, executive teams and boards of directors learn what they need to know to work together to address the challenges posed by cyber threats in the context of overall risk to the business.

(more available)
Added: October 18, 2018
image from 2015 State Of The Phish

2015 State Of The Phish

To provide a clearer idea of where, and how, organizations make themselves most vulnerable to phishing attacks, ThreatSim has prepared this 2015 report, which pools two sources of data: 1) ThreatSim’s anonymous data aggregated across our customer base, involving millions of simulated email phishing. 2) A survey of information technology executives, administrators, and information security professionals.

(more available)
Added: October 18, 2018
image from 2016 Web Application Threat Trend Report

2016 Web Application Threat Trend Report

Readers are encouraged to use this report to get a better understanding of the current threat landscape, including trends specific to different contexts like region, time of day, industry, and more, in order to better fine-tune defenses for meeting the security needs of their unique environments.

(more available)
Added: October 18, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.

Added: October 18, 2018
image from 2017 Ransomware Report

2017 Ransomware Report

From The Report, “With global ransomware damages predicted to exceed $5 billion this year, it is no surprise that ransomware is the fastest growing security threat. As this year’s global attacks have made national news, businesses of all sizes have become increasingly aware of the looming ransomware threat and the challenge of staying protected. Infected companies race the clock to minimize data loss, downtime, and reputation damage. With the seemingly endless profitability, anonymity and ease of execution it doesn’t appear cybercriminals will be turning their back on ransomware anytime soon. Companies are right to expect another year filled with attacks and new variants. The question is how can companies block these attacks before ransom is demanded, and their data along with their reputation is put at risk.”

(more available)
Added: October 18, 2018
image from 2018 Security Pressures Report

2018 Security Pressures Report

Based on a survey of 1,600 information security decision-makers and influencers in six countries, the 2018 Security Pressures Report delves into keeping businesses safeguarded against cyber threats, attacks and compromises.

(more available)
Added: October 18, 2018
image from 3 Steps To Mitigating Insider Threat Without Slowing Down Users

3 Steps To Mitigating Insider Threat Without Slowing Down Users

The point of this white paper is to teach folks how to leverage endpoint security to spot risk and free their users.

(more available)
Added: October 18, 2018
image from A Frictionless Automotive Ecosystem

A Frictionless Automotive Ecosystem

The advent of the connected car has thrust the automotive industry into a new competitive arena – that of data-driven services and value. This represents a sea of change for the industry, and the stakes are enormous. Today’s consumers expect to be able to connect to their world any-time from anywhere, including from their cars. This, in turn, is driving the need for auto manufacturers to offer more and more connectivity options. Manufacturers that handle these expectations well stand to build owner loyalty, increase customer touch points and ultimately sell more vehicles. Those that do not take this approach risk sowing disappointment and losing hard-won customers.

(more available)
Added: October 18, 2018
image from Addressing Mobile Risk: Why Network Traffic Analysis Isn't Enough

Addressing Mobile Risk: Why Network Traffic Analysis Isn't Enough

In this whitepaper, they explain why enterprises need to take a mobile first approach to the security of employees and the data they access and share via apps on their mobile devices. They’ll show you why relying on network traffic analysis alone is insufficient to protect against mobile app threat risk, leaving blind spots that weaken your security posture in an increasingly mobile-centric world.

(more available)
Added: October 18, 2018
image from ASEC Report Volume 87 Q2 2017

ASEC Report Volume 87 Q2 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 2nd Qtr. of 2017.

(more available)
Added: October 18, 2018
image from Behind our Digital Doors: Cybersecurity & the Connected Home

Behind our Digital Doors: Cybersecurity & the Connected Home

In support of National Cyber Security Awareness Month (October), ESET® and the National Cyber Security Alliance (NCSA) commissioned a survey to better understand the role of cybersecurity in the American household, providing an inside-look into how it is adapting in the digital era of the data breach. Given the simultaneous rise in our number of connected devices and cyber threats, this survey underlined the importance of cybersecurity as a core commitment in our digital lives. This paper discusses the findings of that survey.

(more available)
Added: October 18, 2018
image from Broadband Over Existing Cable In Hotels: VDSL2 vs Docsis

Broadband Over Existing Cable In Hotels: VDSL2 vs Docsis

This solution brief discusses networking issues in hotels.

Added: October 18, 2018
image from CISOs Investigate:Endpoint Security

CISOs Investigate:Endpoint Security

The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven risk and technology decisions.

(more available)
Added: October 18, 2018
image from Creating Resilience in the Digital Frontier

Creating Resilience in the Digital Frontier

This paper lays out the 5 steps necessary for the foundation of an effective cyber risk management program.

Added: October 18, 2018
image from Cyber Risk Report 2016

Cyber Risk Report 2016

From the report, “In this report we provide a broad view of the 2015 threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.”

(more available)
Added: October 18, 2018
image from Data Breach QuickView - Mid-Year 2015 Data Breach Trends

Data Breach QuickView - Mid-Year 2015 Data Breach Trends

This annual report offers a quick view of data breach trends for mid-year 2015.

Added: October 18, 2018
image from GDPR Compliancy: A Global Change Is On Its Way

GDPR Compliancy: A Global Change Is On Its Way

In this short article, they provide a quick ability to understand the GDPR and how it will impact the world.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 43
  • 44
  • 45
  • 46
  • 47
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 16:09 UTC (build b1d7be4)