Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Advanced Precision Threat (APT) Protection: Market Quadrant 2018

Advanced Precision Threat (APT) Protection: Market Quadrant 2018

This report discusses APT Protection and how it impacts a certain quadrant of the Market.

Added: October 14, 2018
image from An Introduction To Machine Learning For Mobile Security

An Introduction To Machine Learning For Mobile Security

A close inspection of one of the most exciting and promising fields of research in 2017, and how it might be applied to the fast-moving world of mobile security.

(more available)
Added: October 14, 2018
image from Android Is Ready For The Enterprise

Android Is Ready For The Enterprise

This report offers insight into Android and its use in the modern enterprise.

Added: October 14, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. They then outline best practices for cost-effectively mitigating risk and euring quality in life-critical deployment scenarios.

(more available)
Added: October 14, 2018
image from Cyber Threats To The Energy Industry

Cyber Threats To The Energy Industry

Learn what situations contribute to threat activities towards organizations in the energy industry.

Added: October 14, 2018
image from Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

This whitepaper discusses the disconnects that have emerged between cybersecurity threats and organizations’ contermeasures.

Added: October 14, 2018
image from Data Breach Digest: IoT Calamity, The Panda Monium

Data Breach Digest: IoT Calamity, The Panda Monium

This is a report based on a one man’s experience with IoT security.

Added: October 14, 2018
image from Evolution Of Cloud In Education

Evolution Of Cloud In Education

Vector Consulting was commissioned by Cisco Australia and New Zealand to better understand the role and impact of cloud in higher education and training. For the purposes of this report `cloud’ is predominantly focused on infrastructure as a service or cloud-based infrastructure. The study included desktop research, targeted interviews and a comprehensive survey, which forms the basis for this report. The survey was distributed electronically to Australian and New Zealand institutions to better understand their current views about where cloud was having the most impact and how they were planning for cloud. The survey was in field for two weeks and all individual responses were provided.

(more available)
Added: October 14, 2018
image from FSecure 2017 State Of Cyber Security

FSecure 2017 State Of Cyber Security

This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches.

Added: October 14, 2018
image from How To Fight The Phishing Epidemic And Win

How To Fight The Phishing Epidemic And Win

This ebook takes a look at the Phishing Epidemic and offers some solutions to help organizations win that battle.

Added: October 14, 2018
image from How To Keep Cyberattacks In Check

How To Keep Cyberattacks In Check

This small report offers some simple guidelines that can help your organization keep cyberattacks at bay.

Added: October 14, 2018
image from Information Security and Cyber Liability Risk Management Report 2015

Information Security and Cyber Liability Risk Management Report 2015

This report is based on the findings of a collaborative survey that was designed to gain insight into the current state and ongoing trends in information security and cyber liability risk management. The survey was completed at least in part by 448 respondants which included risk managers, insurance buyers, and other risk professionals.

(more available)
Added: October 14, 2018
image from Intent-Based Networking And Extending The Enterprise

Intent-Based Networking And Extending The Enterprise

Cisco provides a brief report that discusses intent based networking and the enterprise.

Added: October 14, 2018
image from M-Trends 2017

M-Trends 2017

From the report, “For our M-Trends® 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging trends. For the second consecutive year, we have included insights from our FireEye as a Service (FaaS) teams. FaaS monitors organizations 24/7, which gives them a unique perspective into the current threat landscape. Additionally, this year we partnered with law firm DLA Piper for a discussion of the upcoming changes in EMEA data protection laws.”

(more available)
Added: October 14, 2018
image from Mobile Integration Done Right

Mobile Integration Done Right

This paper takes a look at mobile app integration and presents how to do it correctly.

Added: October 14, 2018
image from Next-Gen Biometric Authentication

Next-Gen Biometric Authentication

Much helpful information about Biometric Authentication is revealed in this interview with InAuth Chief Strategy Officer Michael Lynch.

Added: October 14, 2018
image from Quarterly Threat Report:Second Quarter 2017

Quarterly Threat Report:Second Quarter 2017

This is Rapid7’s Quarterly Threat Report, in this report they sought to include composite and industry-level views of events across many industries.

(more available)
Added: October 14, 2018
image from Quarterly Threats Report March 2018 Infographic

Quarterly Threats Report March 2018 Infographic

This infographic is a summary of the main points in the McAfee Labs Quarterly Threat Report from March 2018

Added: October 14, 2018
image from Second Annual State of Ransomware Report: US Survey Results

Second Annual State of Ransomware Report: US Survey Results

The title of the article details what it discusses. Ransware attacks caused 22 percent of small to medium size organizations to cease business operations immediately.

(more available)
Added: October 14, 2018
image from Secure The Vote With Zero Trust Security

Secure The Vote With Zero Trust Security

This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers.

Added: October 14, 2018
image from Security Response: How safe is your quantified self?

Security Response: How safe is your quantified self?

Fueled by technological advances and social factors, the quantified self movement has experienced rapid growth. Quantified self, also known as self-tracking, aims to improve lifestyle and achievements by measuring and analyzing key performance data across a range of activities. This report deals with the threats and vulnerabilities that are present in the devices used to provide those measurements and analysis.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 50
  • 51
  • 52
  • 53
  • 54
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 00:08 UTC (build b1d7be4)