Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience.

(more available)
Added: October 13, 2018
image from Choosing A Mobile App Integration Solution

Choosing A Mobile App Integration Solution

This paper seeks to aid the reader with choosing a mobile app integration solution.

Added: October 13, 2018
image from Continuous Monitoring And Compliance In The Cloud

Continuous Monitoring And Compliance In The Cloud

This whitepaper takes a look at the issues of using and implementing continuous monitoring and maintaining government compliance.

Added: October 13, 2018
image from Cyber Attacks: Power Failure Implications

Cyber Attacks: Power Failure Implications

A paper discussing the impact of a cyber attack on the power grid.

Added: October 13, 2018
image from Cyber Threats To The Education Industry

Cyber Threats To The Education Industry

Understand the cyber threats targeting the education industry, including subsectors impacted by advanced threat groups.

Added: October 13, 2018
image from Cyber Vulnerability Index report

Cyber Vulnerability Index report

The report focuses on how insurance can help make UK companies more resilient to the cyber threat, and is the result of co-operation between representatives of the UK Government and the insurance industry, led by the Cabinet Office and Marsh.

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Report

Cybersecurity Insights Report

This research explores the personal impact of online crime. “Our hope is that the findings will move people from general awareness online of the threats to a clearer sense of what’s at risk and why they should care—and take action.”

(more available)
Added: October 13, 2018
image from Data Centric Approach To Endpoint Secuirty

Data Centric Approach To Endpoint Secuirty

This paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the reange of considerations and concrete next steps in the decision-making process.

(more available)
Added: October 13, 2018
image from Duo Security's Two Factor Evaluation Guide

Duo Security's Two Factor Evaluation Guide

This guide provides comprehensive help for enterprises seeking to evaluate two factor authentication services.

Added: October 13, 2018
image from Equifax: A Cautionary Tale

Equifax: A Cautionary Tale

Rather than dismiss the Equifax incident as something that “could never happen to us,” know that it absolutely could. The only way to avoid a devastating breach is through a meticulous prevention strategy and a strong security posture. Once the iceberg’s been hit, the response by employees, investors and even executives will surprise you. Here’s a breakdown of what happened to one of the largest credit agencies on the planet.

(more available)
Added: October 13, 2018
image from Firewall Best Practices To Block Ransomware

Firewall Best Practices To Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job. In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.

(more available)
Added: October 13, 2018
image from Going After The Weak Link: Security In Mergers & Acquisitions

Going After The Weak Link: Security In Mergers & Acquisitions

This report discusses the security issues involved in mergers and acquisitions of other organizations.

Added: October 13, 2018
image from IBM X-Force Threat Intelligence Quarterly, 1Q 2015

IBM X-Force Threat Intelligence Quarterly, 1Q 2015

This paper provides a complete roundup of cyber incidents in 2014.

Added: October 13, 2018
image from Microlearning: Small Bites, Big Cybersecurity Impact

Microlearning: Small Bites, Big Cybersecurity Impact

This whitepaper covers the six things every organization must have to “move the security awareness training” needle.

Added: October 13, 2018
image from Pathways into Cybercrime

Pathways into Cybercrime

There are a number of young people in the UK that are are becoming involved in cyber dependent crime. This report aims to Collate, and analyze offender briefs to identify motivations and pathways into cyber crime, as well as review academic studies in this area, to identify key intervention points that should be targeted and identify gaps in understanding and propose recommendations.

(more available)
Added: October 13, 2018
image from PCI Compliance: Employee Awareness Is Key

PCI Compliance: Employee Awareness Is Key

This guide has been written to break down PCI requirements into layman’s terms and offer actionable insights into establishing a PCI-compliant security awareness program.

(more available)
Added: October 13, 2018
image from Phishing Activity Trends Report, 1st-3rd Quarters 2015

Phishing Activity Trends Report, 1st-3rd Quarters 2015

The APWG Phishing Activity Trends Report analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website at http://www.apwg.org, and by e-mail submissions to reportphishing@antiphishing.org. APWG also measures the evolution, proliferation, and propagation of crimeware by drawing from the research of our member companies.

(more available)
Added: October 13, 2018
image from Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

This blog post takes a look at a vulnerability unique to the Logitech Harmony Hub.

Added: October 13, 2018
image from Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions

You’re convinced that protecting privileged accounts is paramount in your security strategy. But how do you go about selecting the right solutions from the right provider? You need a guide to know what to expect, and what to look for as you evaluate potential privileged account security solutions. To help you make informed decisions, the following are seven questions to ask every potential vendor as part of your assessment.

(more available)
Added: October 13, 2018
image from Spies In The Enterprise

Spies In The Enterprise

Bitglass reports on the results of their survey regarding how cybersecurity teams are mitigating various threats in the cloud.

Added: October 13, 2018
image from Spotlight On 2017

Spotlight On 2017

This edition of Spotlight features a selection of work carried out in 2017 by the Rand Corporation, to help meet new and evolving challenges. They have completed several studies that examine the implications of Brexit for the UK, the EU, and beyond. They have examined the potential of increasingly advanced technology, including in the areas of cybersecurity and digital transactions. And they have evaluated and recommended improvements to be made along the path to better systems in health, policing and education.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 52
  • 53
  • 54
  • 55
  • 56
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 21, 2025 20:09 UTC (build b1d7be4)