Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

This paper discusses the security issues related to biometric facial recognition applications.

Added: October 17, 2018
image from Mcafee Labs Threats Report September 2017

Mcafee Labs Threats Report September 2017

In this quarterly threats report, they highlight three Key Topics: In the lead story, they analyze the recent WannaCry and Petya attacks, the perpetrators’ likely motives, and the business impact. The second Key Topic departs from their usual threat analysis stories. Because threat hunting is becoming increasingly important, in this story they offer detailed advice and recommendations for using certain types of indicators of compromise when hunting for threats. In the final Key Topic, they explore script-based malware—why it is used, how authors obfuscate scripts, how it propagates, and its growth in popularity.

(more available)
Added: October 17, 2018
image from Mobile Data Report

Mobile Data Report

This report pays particular attention to the state of mobile security in law firms.

Added: October 17, 2018
image from Payment Security Report 2015

Payment Security Report 2015

This report concerns itself with the standards and practices related to credit and debit card payment options.

Added: October 17, 2018
image from Ransomware: A Victims perspective

Ransomware: A Victims perspective

This paper seeks to answer the following questions, “What motivates victims to pay up? How much do they value their data? What role does antivirus protection play in the problem-solving equation?"

(more available)
Added: October 17, 2018
image from Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

This guide provides an overview of connected or IoT medical devices, their benefits and risks, real life use cases and best practice security guidelines.

(more available)
Added: October 17, 2018
image from Security Response: The Evolution of Ransomware

Security Response: The Evolution of Ransomware

This report takes a look at how the ransomware types work, not just from a technological point of view but also from a psychological viewpoint. They also look at how these threats evolved, what factors are at play to make ransomware the major problem that it is today, and where ransomware is likely to surface next.

(more available)
Added: October 17, 2018
image from State of the Internet Q3 2015 report

State of the Internet Q3 2015 report

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2015, covering Internet connection speeds and broadband adoption metrics as well as trends seen in this data over time. In addition, the report includes insight into the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter, and observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks.

(more available)
Added: October 17, 2018
image from The Evolution Of Network Access Control

The Evolution Of Network Access Control

This whitepaper discusses the growing network security issues caused by IoT, BYOD, and other issues occuring in cyber technology.

Added: October 17, 2018
image from The National Computer Security Survey (NCSS)

The National Computer Security Survey (NCSS)

The Bureau of Justice Statistics (BJS) within the U.S. Department of Justice (DOJ), along with the U.S. Department of Homeland Security (DHS), conducted the National Computer Security Survey (NCSS), a nationally representative sample of businesses across 36 industry sectors. This report will be of interest to researchers and analysts who are interested in under- standing the methodology underlying the NCSS, including questionnaire design, survey field- ing, sampling, and weighting methodologies for this large-scale survey. The report will also be informative for scholars who are interested in analyzing the NCSS public-use data file.

(more available)
Added: October 17, 2018
image from The Rising Face of Cybercrime: Ransomware

The Rising Face of Cybercrime: Ransomware

In this Report, researchers analyzed the growing trend of ransomware across nearly 20,000 companies to identify common forms of ransomware, and identify which industries are most susceptible to these types of attacks.

(more available)
Added: October 17, 2018
image from Threat Advisory: SkyDemon Mobile Apps & Website

Threat Advisory: SkyDemon Mobile Apps & Website

This is a threat advisory for SkyDemon Mobile Apps & Website.

Added: October 17, 2018
image from Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

This small report gives a analysis of DDoS attacks and how they are launched and deployed.

Added: October 17, 2018
image from Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. This paper will discuss six of the top considerations.

(more available)
Added: October 17, 2018
image from Trusted Access Report 2018

Trusted Access Report 2018

This report takes a closer look at user authentications and how users behave in phishing simulations, as well as shedding light on the security health of users’ devices used to log into enterprise applications.

(more available)
Added: October 17, 2018
image from Under The Hoodie: Lessons From A Season Of Penetration Testing

Under The Hoodie: Lessons From A Season Of Penetration Testing

This report offers insight from the research and results of Rapid7’s repeated penetration testing.

Added: October 17, 2018
image from Visual Networking Index: Forecast and Methodology, 2016-2021

Visual Networking Index: Forecast and Methodology, 2016-2021

This paper takes a look at networking and analyzes what can be expected and what will happen in the future.

(more available)
Added: October 17, 2018
image from What About The Plant Floor: Six Subversive Concerns For Industrial Environments

What About The Plant Floor: Six Subversive Concerns For Industrial Environments

This paper describes six key weaknesses that an adversary can use to undermine a plant’s operation, providing real-life threat details and mitigation options.

(more available)
Added: October 17, 2018
image from 2016 Shadow Data Report

2016 Shadow Data Report

The Shadow Data Report published by Elastica CloudThreat Labs, addresses key trends and challenges facedby enterprises securing data stored and shared via cloudapps and services.

(more available)
Added: October 16, 2018
image from ASEC Report Volume 85 January 2017

ASEC Report Volume 85 January 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in January of 2017.

(more available)
Added: October 16, 2018
image from Benefits And Costs Of Alternate Cyber Futures

Benefits And Costs Of Alternate Cyber Futures

This report seeks to answer the following questions, In 2030, will the Internet and related information and communications technologies (ICT) continue to drive global innovation and prosperity? Or, will that bright promise be swamped by an unstable and insecure Internet, so overwhelmed by non-stop attacks that it has become an increasing drag on economic growth?

(more available)
Added: October 16, 2018
  • ««
  • «
  • 46
  • 47
  • 48
  • 49
  • 50
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 12:09 UTC (build b1d7be4)