Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from State of the Internet Security Web Attacks Summer 2018

State of the Internet Security Web Attacks Summer 2018

From the report, “This quarter, we’re taking a deeper look into the attacks directed against the hospitality industry - including hotel, travel, and airline sites - in an effort to understand why five out of six logins at these sites use fake or stolen credentials. We were surprised to find that many of these login attempts were coming from Russia and China, a departure from the general attack trends.”

(more available)
Added: October 13, 2018
image from The EU General Data Protection Regulation

The EU General Data Protection Regulation

This whitepaper discusses what the General Data Protection Regulation (GDPR) will mean to organizations globally.

Added: October 13, 2018
image from The French Underground: Under A Shroud Of Extreme Caution

The French Underground: Under A Shroud Of Extreme Caution

If the North American underground had an alter ego, it would be the French underground. A deep dive into the North American underground1 revealed that it is a “glass tank,” open to not only the tech-savviest of hackers, but also visible to both cybercriminals and law enforcement. The French underground, meanwhile, is not only well-hidden in the Dark Web, its players also operate with extreme caution. Read this paper to find out more.

(more available)
Added: October 13, 2018
image from The Guide To Secure Mobile Gateways

The Guide To Secure Mobile Gateways

According to Statcounter, mobile data internet traffic surpassed desktop based traffic for the first time in 2016. With Gartner estimating one-third of all malware coming from mobile devices in 2019 and less than 10% of organizations implementing Mobile Threat Defense solutions1, the threat landscape for mobility is ripe for hackers. Read the report to find out more about how organizations can defend themselves against these threats.

(more available)
Added: October 13, 2018
image from The Healthcare Industry's Resolutions For A Safer 2018

The Healthcare Industry's Resolutions For A Safer 2018

This report takes a look at some of the damages that occurred in the Healthcare Industry, and examines what positive steps can be made in 2018 to make a safer cybersecurity experience for the industry.

(more available)
Added: October 13, 2018
image from Threat Advisory: CBS mobile apps & website

Threat Advisory: CBS mobile apps & website

This is a threat advisory for CBS mobile apps & website

Added: October 13, 2018
image from Threat Summary And Year In Review Q4 2016

Threat Summary And Year In Review Q4 2016

This Quarterly report offers key takeaways from the fourth Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 13, 2018
image from Top 7 Office 365 Security Use Cases For a CASB 2016

Top 7 Office 365 Security Use Cases For a CASB 2016

This eBook discusses revelant cloud security information for those using Microsoft Office 365

Added: October 13, 2018
image from Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

The ever-changing cyber threat environment is forcing IT decision-makers (ITDMs) to re- evaluate their security strategies. How well equipped are SMBs to protect their data? How are they adapting their approaches to keep pace with a barrage of new cyber threats? To find out, Webroot commissioned a study of ITDMs in the US, UK, and Australia to evaluate the current security concerns and strategies of SMBs around the world. This report discusses the results of that survey.

(more available)
Added: October 13, 2018
image from Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

As security measures get better at detecting and blocking both malware and cyberattacks, adversaries and cybercriminals are forced to constantly develop new techniques to evade detection. One of these advanced techniques involves “fileless" exploits, where no executable file is written to disk. These attacks are particularly effective at evading traditional antivirus (AV) solutions, which look for files saved to disk so they can scan them and determine if they are malicious. This report discusses these issues.

(more available)
Added: October 13, 2018
image from 2015 Annual Security Report

2015 Annual Security Report

The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.

(more available)
Added: October 12, 2018
image from 2015 Data Breach Reports

2015 Data Breach Reports

This report is an overwhelmingly large list and description of security breaches. It details type of industry impacted, type of attack, and types of information compromised.

(more available)
Added: October 12, 2018
image from 2016 Global Cyersecurity Assurance Report Card

2016 Global Cyersecurity Assurance Report Card

“The objective of this inaugural Tenable Network Security research study is to measure how enterprise IT security professionals view their organization’s ability to assess cybersecurity risks and to mitigate threats that can exploit those risks. In doing so, Tenable has developed the industry’s first Global Cybersecurity Assurance Report Card, which assigns indices and grades to responding organizations globally, by country, and by industry based on the responses of the security practitioners themselves.”

(more available)
Added: October 12, 2018
image from 2016 Norton Cyber Security Insights Report

2016 Norton Cyber Security Insights Report

This report finds that victims of cybercrime within the past year often continued their unsafe behavior. This report details and discusses this issue.

(more available)
Added: October 12, 2018
image from 2018 Vulnerability Statistcs Report

2018 Vulnerability Statistcs Report

This Report provides key takeaways from the vulnerability issues of 2017.

Added: October 12, 2018
image from A Crypto Mining Operation Unmasked

A Crypto Mining Operation Unmasked

This article provides an insightful report on a CryptoMining Operation.

Added: October 12, 2018
image from A Guide To Content Filtering For Mobile

A Guide To Content Filtering For Mobile

This report covers the challenges, trends and benefits of Content Filtering in a mobile-first environment.

Added: October 12, 2018
image from A Technical Solutions Guide For Privileged Password And Session Management Use Cases

A Technical Solutions Guide For Privileged Password And Session Management Use Cases

Despite the number of data breach stories in the news, many IT organizations fall into the easy trap of using shared accounts for users, administrators, or applications. While this practice means that, when access is needed, everyone can easily pitch in to get the work done, it comes with massive, unjustifiable security and compliance tradeoffs. This paper seeks to provide assistance with these situations.

(more available)
Added: October 12, 2018
image from Best Practices For Protecting Your Data When Employees Leave Your Company

Best Practices For Protecting Your Data When Employees Leave Your Company

When employees leave a company, whether voluntarily or involuntarily, it is quite common for them to take sensitive and confidential data with them. This paper examines this problem in detail and provides solutions for employers to mitigate the risks.

(more available)
Added: October 12, 2018
image from Crowdstrike Endpoint Strategies White Paper

Crowdstrike Endpoint Strategies White Paper

This whitepaper tries to outline a new standard of response to endpoint security.

Added: October 12, 2018
image from Cyber Threats To The Construction And Engineering Industries

Cyber Threats To The Construction And Engineering Industries

Learn why the construction and engineering sectors are high profile targets for state-sponsored threat actors engaged in cyber espionage.

Added: October 12, 2018
  • ««
  • «
  • 53
  • 54
  • 55
  • 56
  • 57
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 21, 2025 20:09 UTC (build b1d7be4)