Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Buidling a Business Driven Financial SOC

Buidling a Business Driven Financial SOC

This whitepaper outlines the unique challenges that business-driven financial SOCs deal with, and provides tools and tips on how to manage and resolve these challenges.

(more available)
Added: October 16, 2018
image from Delivering Strong Security In A HyperConverged Data Center Environment

Delivering Strong Security In A HyperConverged Data Center Environment

From The Report, “Just as hyperconvergence in the data center will have a huge impact on how systems and data are managed, it will have significant repercussions for information security. Any organization that thinks security does not need to change in a hyperconverged environment puts data and systems reliability at risk.”

(more available)
Added: October 16, 2018
image from Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

This paper seeks to simplify Cloud security and offers some solutions to the issues that an enterprise might deal with.

(more available)
Added: October 16, 2018
image from Evaluation Guide For Mobile App Security Testing

Evaluation Guide For Mobile App Security Testing

This book provides some good guidance for app security testing. It seeks to assist enterprises with solving the issues surrounding app security.

(more available)
Added: October 16, 2018
image from Executive Briefing Series: Mobile Cyber Security

Executive Briefing Series: Mobile Cyber Security

This is a brief introduction to Mobile Cyber Security

Added: October 16, 2018
image from Farewell To Audit Season

Farewell To Audit Season

This report discusses the new reality that audits and compliance are no longer a seasonal issue. It lays out some good steps for daily audits for the sake of compliance.

(more available)
Added: October 16, 2018
image from GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 16, 2018
image from HIPAA & The Enterprise Network

HIPAA & The Enterprise Network

This whitepaper will explore HIPAA requirements and how comprehensive network security automation and orchestration will control endpoints, provide total visibility of all network access devices and automate threat response to help ensure compliance.

(more available)
Added: October 16, 2018
image from Insiders Guide to Defeating Ransomware

Insiders Guide to Defeating Ransomware

This e-book sounds the alarm about the threat of ransomware for businesses and public sector organizations, equips security professionals with the facts about the risks and consequences of ransomware, and presents an approach to protect enterprise data from ransomware attacks.

(more available)
Added: October 16, 2018
image from It's Time To Breakup With Your Old-School Archive

It's Time To Breakup With Your Old-School Archive

This ebook takes a look at cloud archiving, and why it is a better choice than older more traditional methods.

(more available)
Added: October 16, 2018
image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management.

(more available)
Added: October 16, 2018
image from Mobile Security Index 2018 Infographic

Mobile Security Index 2018 Infographic

This infographic is based on the report of the same name.

Added: October 16, 2018
image from Ransomware What Lies Ahead?: A Comprehensive Guide to Ransomware Variants

Ransomware What Lies Ahead?: A Comprehensive Guide to Ransomware Variants

This paper is the result of detailed research into classic and unique ransomware families. Its purpose is to provide a solid foundation for developing protective measures in your organization. Reading this paper offers a thorough understanding of the different types of ransomware, how it can be created and the course of itsevolution,especiallyasitexpandsintonewterritories such as mobile devices and IoT.

(more available)
Added: October 16, 2018
image from Security Response: The Apple Threat Landscape

Security Response: The Apple Threat Landscape

This report examines the weaknesses in Apple products and the growing trend of attacks on the Apple system.

Added: October 16, 2018
image from The Busy Manager's Guide To Open Security

The Busy Manager's Guide To Open Security

Following the Equifax hack, this document is a guide to help your organization protect their Open-Source information.

Added: October 16, 2018
image from The Cost of Malware Containment

The Cost of Malware Containment

Ponemon Institute conducted this research to understand how much money organizations are wasting in their efforts to prevent malware driven threats and other malicious programs from stealing high value and confidential data. To ensure a knowledgeable participant, we surveyed 630 IT and IT security practitioners in the United States who are familiar with their organization’s practices for containing malware infections. They also have responsibility in detecting, evaluating and/or containing malware infections within their organization.

(more available)
Added: October 16, 2018
image from The Evolution And Revolution Of The CISO

The Evolution And Revolution Of The CISO

This report explores both the incremental and transformational skills required for current and future CISO success, examining which fundamental technology and security capabilities matter most and which unexpected skills CISOs will need to acquire to help organizations reshape security to drive business success.

(more available)
Added: October 16, 2018
image from The Evolving State Of Network Security

The Evolving State Of Network Security

ProtectWise partnered with Osterman Research to interview more than 400 security analysts in the United States in order to uncover the state of network security today across organizations with 1,000 or more employees. The research looked at the biggest security challenges from the inside out, from staffing priorities to the need for specialized roles.

(more available)
Added: October 16, 2018
image from The Executive Cyber Security Playbook

The Executive Cyber Security Playbook

In this ebook, FireEye explains why senior executives must be more proactive about cyber security — before, during and after an event — and how they can help create and maintain a strong security posture.

(more available)
Added: October 16, 2018
image from The Human Point: An Intersection Of Behaviors, Intent, & Critical Business Data

The Human Point: An Intersection Of Behaviors, Intent, & Critical Business Data

Forcepoint conducted a study of 1,252 cybersecurity professionals worldwide to better understand the state of cybersecurity and how organizations might view a forward-focused strategy, one that moves beyond the current state of chasing infrastructure remediation. The following is an extensive rendering of the data culled, which provides a new perspective on how cybersecurity should be tackled in the future.

(more available)
Added: October 16, 2018
image from The Update Framework Security Assessment

The Update Framework Security Assessment

During the summer of 2017, a study was done on the security issues related to the TUF framework.

Added: October 16, 2018
  • ««
  • «
  • 47
  • 48
  • 49
  • 50
  • 51
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 04:09 UTC (build b1d7be4)