Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

Tech Industry Doppelgangers: Campaign Innovation In the World of Cybercrime

This thought piece draws on the experience of 451 Networks analysts and interviews with defensive security professionals to review major trends in attackers tools, techniques, and processes (TTPs).

(more available)
Added: October 14, 2018
image from The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

In this ebook, they examine a specific cyber attack on a Ukrainian utility company in detail, and identify common steps that are used time and again during advanced attacks.

(more available)
Added: October 14, 2018
image from The Essential Guide To Securing Remote Access

The Essential Guide To Securing Remote Access

This guide will cover the different threats to each area with real-world examples, including exploits that affect remote access software and storage, and provide solutions and security best practice recommendations to help your organization protect against a data breach.

(more available)
Added: October 14, 2018
image from The Future of Cybercrime and Security

The Future of Cybercrime and Security

From the report, “This research will present some general trends in cybercrime, as well as indicating the potential global cost of malicious software use. It will discuss specific threats to financial and device-based businesses, as well as providing analyses of the current and future trends in cybercriminal activity, alongside general advice on how to prevent and/or minimise the impact of cybercrime.”

(more available)
Added: October 14, 2018
image from The Mobile Device: The Center Of The Fraud Prevention Universe

The Mobile Device: The Center Of The Fraud Prevention Universe

From The Report, “A vision is emerging that balances effective fraud prevention with a delightful customer experience…The mobile device sits at the center of this vision. Properly secured, the mobile device can not only facilitate safer transactions within its own channel but can also be used to better secure other channels with minimal customer friction. This white paper will delve deeper into this vision and the roadmap for forward-thinking fraud executives."

(more available)
Added: October 14, 2018
image from The Procrastinator's Guide To NIST-800-171

The Procrastinator's Guide To NIST-800-171

This report offers helpful insight into preparing for compliance with NIST-800-171.

Added: October 14, 2018
image from The Reign Of Ransomware

The Reign Of Ransomware

In this report, we round up all the significant security stories during the first half of 2016 to encourage businesses to check for vulnerabilities cybercriminals may abuse. Our report also aims to highlight the need for enterprises to be vigilant in finding solutions that would stop cybercriminals from winning and letting our prediction become their reality.

(more available)
Added: October 14, 2018
image from The Rise of Nation State Attacks

The Rise of Nation State Attacks

The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation state attacks due to an uncertainty as to what a nation state attack is and how to identify the key characteristics, methods and motives of these attacks that originate with foreign governments.

(more available)
Added: October 14, 2018
image from The State of Bug Bounty 2016

The State of Bug Bounty 2016

This is an annual report that provides an inside look into the economics and emerging trends of bug bounties, with data collected from Bugcrowd’s platform and other sources throughout 2016. This report is published on a yearly basis for CISOs and other security decision makers to provide a transparent look at the evolving bug bounty market.

(more available)
Added: October 14, 2018
image from The State Of Endpoint Security Today

The State Of Endpoint Security Today

This paper delivers insights into the prevalent cybersecurity issues facing organizations today: from ransomware to exploits and machine learning, it shares the experiences and future plans of IT managers across the globe. It’s an illuminating read, providing insight into where the field stands on these issues.

(more available)
Added: October 14, 2018
image from Top Ten DNS Attacks

Top Ten DNS Attacks

This report takes a look at the top ten DNS attacks.

Added: October 14, 2018
image from Under Threat or Compromise

Under Threat or Compromise

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape.

(more available)
Added: October 14, 2018
image from Using Network Analytics To Detect PowerShell Attacks

Using Network Analytics To Detect PowerShell Attacks

This report provides an analysis of Microsoft’s PowerShell language and how it has been used by cybercriminals.

Added: October 14, 2018
image from Webroot Threat Report 2017

Webroot Threat Report 2017

The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year.

(more available)
Added: October 14, 2018
image from 2015 Internet Security Threat Report, Volume 20

2015 Internet Security Threat Report, Volume 20

This annual Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

(more available)
Added: October 13, 2018
image from 5 Steps To Executing A Mobile Defense Strategy

5 Steps To Executing A Mobile Defense Strategy

This paper provides a simple guide to executing a mobile defense strategy.

Added: October 13, 2018
image from 6 Important Steps To Evaluating A Web Security Solution

6 Important Steps To Evaluating A Web Security Solution

Six Important Steps to Evaluating a Web Security Solution from EdgeWave®, offers IT professionals a checklist for evaluating Web security vendor solutions. The goal is to help you size up competitive offerings and understand new approaches to the critical problem of protecting your organization from mailcious web sites and inappropriate web use.

(more available)
Added: October 13, 2018
image from Anatomy Of A 400GE FEC

Anatomy Of A 400GE FEC

This infographic provides a poster for looking at the Anatomy of a 400GE FEC.

Added: October 13, 2018
image from Android Security: 2015 Year In Review

Android Security: 2015 Year In Review

From the report, “We consider transparency to be critical, so our second annual Android Security Year in Review is intended to share the progress we’ve made with regards to security in the last year, as well as provide our view of the state of security in the Android ecosystem.”

(more available)
Added: October 13, 2018
image from Annual Fraud Benchmarking Report:

Annual Fraud Benchmarking Report:

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 13, 2018
image from App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

This report seeks to clarify how app-centric security approaches can aid flexibility in a rapidly changing mobile world.

Added: October 13, 2018
  • ««
  • «
  • 51
  • 52
  • 53
  • 54
  • 55
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 21, 2025 20:09 UTC (build b1d7be4)