Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Generations of Machine Learning In Cybersecurity

Generations of Machine Learning In Cybersecurity

In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. In addition, the paper seeks to explain that while a great deal of progress has been made in the evolution of machine learning’s application to cybersecurity challenges, there remains an immense amount of opportunity for innovation and advancement in the field, and they expect the sophistication of applications of machine learning to continue to evolve over time.

(more available)
Added: October 18, 2018
image from Global Threat Report Q4 2017

Global Threat Report Q4 2017

This report takes a look at the mobile threat events for the last quarter of 2017.

Added: October 18, 2018
image from Hacking Healthcare IT in 2016

Hacking Healthcare IT in 2016

This report begins with the following statement, “Among all of America’s critical infrastructures, the healthcare sector is the most targeted and plagued by perpetual persistent attacks from numerous unknown malicious hackers, intent on exploiting vulnerabilities in their insecure and antiquated networks in order to exfiltrate patient health records.” The paper then goes on to discuss the IT struggles of the healthcare sector.

(more available)
Added: October 18, 2018
image from HIPAA Compliant Containers

HIPAA Compliant Containers

This Technical paper discusses the need for Containers. Containers allow deployment of single-purpose virtual compute instances for processing workloads in the cloud regardless of the operating system used. Care must be taken, however, to ensure that your container strategy, deployment methodology, monitoring protocols, and vulnerability management practices are harmonized in a manner that complies with the HIPAA Security Rule, as well as industry recognized security frameworks such as NIST, ISO, CSF and PCI DSS. Read the Paper to understand more about that issue.

(more available)
Added: October 18, 2018
image from Mobile App Security Program Management Handbook

Mobile App Security Program Management Handbook

From the report, “While I call this document a ‘getting started guide,’ regardless of your program’s maturity I think you’ll find some helpful hints regarding the people, process, and technology that can elevate your mobile app security program to the next level.”

(more available)
Added: October 18, 2018
image from Mobile Data Report

Mobile Data Report

This report looks at data from the mobile estates of global asset management and investment firms; providing analysis, benchmarking and best practice guidance on keeping mobile devices secure and managing data consumption.

(more available)
Added: October 18, 2018
image from Mobile Threat Detection Through Machine Learning

Mobile Threat Detection Through Machine Learning

This paper is subtitled “Discover the ideal technology dor detecting unknown, zero-day mobile threats.

Added: October 18, 2018
image from Network Attached Security Attacking A Synology NAS

Network Attached Security Attacking A Synology NAS

Network-Attached Storage (NAS) devices are a popular way for people to store and share their photos, videos and documents. Securing these devices is essential as they can contain sensitive information and are often exposed to the Internet. Because Synology is one of the top manufacturers of NAS devices, this paper chose to analyze a Synology DS215j. In doing so it identifies a number of exploitable security flaws. In this paper, they discuss in detail the analysis performed, methodologies used, and vulnerabilities found during the summer of 2015.

(more available)
Added: October 18, 2018
image from Personalisation Opportunities In Retail Stores Enhancing Customer Experience Through Location-based Analytics

Personalisation Opportunities In Retail Stores Enhancing Customer Experience Through Location-based Analytics

This report takes a look at the future of the retail industry and how an organizations network can assist with customer experience.

(more available)
Added: October 18, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

Here are some quick facts about this report and what they tell us about the issues that the healthcare industry as a whole needs to address: 58% of incidents involved insiders—healthcare is the only industry in which internal actors are the biggest threat to an organization. Medical device hacking may create media hype but the assets most often affected in breaches are databases and paper documents. Ransomware is the top malware variety by a wide margin. 70% of incidents involving malicious code were ransomware infections. Basic security measures are still not being implemented. Lost and stolen laptops with unencrypted PHI continue to be the cause of breach notifications.

(more available)
Added: October 18, 2018
image from Ransomware's Stronghold On Healthcare

Ransomware's Stronghold On Healthcare

This report discusses Ransomware’s Stronghold on Healthcare, the Impact on HIPAA Compliance, and Taking the Offensive: What You Need to Know

(more available)
Added: October 18, 2018
image from Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

This report looks at a remote access Trojan named KONNI that was targeting North Korea.

Added: October 18, 2018
image from State of the Internet Q4 2015 report

State of the Internet Q4 2015 report

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2015, covering Internet connection speeds and broadband adoption metrics as well as trends seen in this data over time. In addition, the report includes insight into the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter, and observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks.

(more available)
Added: October 18, 2018
image from Stormshield Endpoint Monitoring Review 2017

Stormshield Endpoint Monitoring Review 2017

This infographic provides an analysis of the types of events that occurred in 2017 for this particular Endpoint Security provider.

(more available)
Added: October 18, 2018
image from The Cyber Resilient Organization: Learning to Thrive against Threats

The Cyber Resilient Organization: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed 623 IT and IT security practitioners about their organizations’ approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 18, 2018
image from The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

Don’t let Hollywood fool you: carrying out an attack doesn’t resemble the plot of an action movie. Attackers don’t automatically breach a network, immediately locate the information they want and then swiftly exit the organization. Attacks are complicated operations that unfold over multiple steps and take time, weeks and oftentimes months to achieve the desired goals.

(more available)
Added: October 18, 2018
image from The Internet Of Things Isn't Coming, It's Here

The Internet Of Things Isn't Coming, It's Here

This report discusses the results of a survey conducted in 2016 that asked respondents what makes something a “thing” instead of a “computer.”

(more available)
Added: October 18, 2018
image from Threat Landscape Report Q4 2016

Threat Landscape Report Q4 2016

This report seeks to draw an accurate representation of the cyber threat landscape in Q4 2016 leveraging the vast information resources and expertise of FortiGuard Labs. We seek to share our perspective on the threats that exist, how often they occur, what differs across sectors and regions, and what’s changing over time.

(more available)
Added: October 18, 2018
image from UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

This paper takes a look at the cities of the United Kingdom, and the cyber threats that occurred there.

Added: October 18, 2018
image from Understanding And Selecting A Data Loss Prevention Solution

Understanding And Selecting A Data Loss Prevention Solution

This Paper provides the background on DLP, to help you understand the technology, know what to look for in a product or service, and make the best decision for your organization.

(more available)
Added: October 18, 2018
image from Who Moved My Secure Perimeter

Who Moved My Secure Perimeter

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 44
  • 45
  • 46
  • 47
  • 48
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 16:09 UTC (build b1d7be4)