Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from Cybersecurity Challenges in Aviation

Cybersecurity Challenges in Aviation

This paper discusses the issues and challenges involved in maintaining good cybersecurity in the field of aviation.

Added: October 12, 2018
image from Cybersecurity In Healthcare: The Diagnosis

Cybersecurity In Healthcare: The Diagnosis

This report was commissioned to understand whether or not the healthcare industry was prepared for the growing and evolving cybersecurity threats.

(more available)
Added: October 12, 2018
image from Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

In this report the authors provide insight into the importance of data security.

Added: October 12, 2018
image from EMV Issuance Trajectory And Impact On Account Takeover And CNP

EMV Issuance Trajectory And Impact On Account Takeover And CNP

This report is sponsored by iovation, which wanted to investigate the state of the U.S. EMV migration and the associated account takeover, CNP fraud, and application fraud trends. The research will help FI executives benchmark their EMV progress against their peers’ and better understand the rapidly shifting fraud landscape.

(more available)
Added: October 12, 2018
image from Enhanced Threat Awareness Proposition

Enhanced Threat Awareness Proposition

This paper posits that, “A re-classification of vulnerability rules and their respective attack chains derived through log analysis alerts may now be modified and adjusted through big data processing. Analysis and presentation of attack chain data should be supplied to customers and should cover each stage of a compromised asset or attack.”

(more available)
Added: October 12, 2018
image from Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

This paper investigates many observable characteristics of web-servers that may affect the likelihood of compromise.

Added: October 12, 2018
image from IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions widespread, trusted identity exchanges using federated methods that are secure, interoperable, privacy-enhancing and easy to use. Realization of that vision will require companies, agencies and individuals to perform at a new level. The Requirements are our first step towards that goal, by describing a set of functions that parties must be able to fulfill, and a set of criteria for assessing those capabilities.

(more available)
Added: October 12, 2018
image from Legal Cybersecurity Checklist

Legal Cybersecurity Checklist

This whitepaper seeks to provide aid to lawfirms and their need for security compliance with their clients.

Added: October 12, 2018
image from M-Trends 2015

M-Trends 2015

Mandiant consultants’ role as the first responders to critical security incidents gives them a unique vantage point into how attackers’ motives and tactics are changing . The insights and analysis presented here represent their combined experience over the course of hundreds of service engagements . Over the last decade, they have helped clients across more than 30 industries around the globe .

(more available)
Added: October 12, 2018
image from Network Threat Detection

Network Threat Detection

This report aims to compare the effectiveness of a selection of threat detection appliances. The products were exposed to internet threats that were live during the test period, as well as crafted exploit-based attacks.

(more available)
Added: October 12, 2018
image from Panda Labs Annual Report 2017

Panda Labs Annual Report 2017

This report discusses events of 2017 and lays out trends and predictions for 2018, including the secret of how to fight malware. In this report’s conclusion, they go a little more into detail, but ultimately the secret is “forgetting about” malware. If we focus on fighting malware, the battle is lost before it has begun.

(more available)
Added: October 12, 2018
image from Producing Your Network Security Policy

Producing Your Network Security Policy

This paper is designed to help you put together your organization’s network security policy.

Added: October 12, 2018
image from Regional Advanced Threat Report: Latin America 1H 2015

Regional Advanced Threat Report: Latin America 1H 2015

This report discusses trends in the cyber security environment in Latin America from January to June 2015.

Added: October 12, 2018
image from Report Malware PI

Report Malware PI

This report takes a look at Malware in the cloud and offers some solutions to the problem.

Added: October 12, 2018
image from Security Healthcare Information Security Guide

Security Healthcare Information Security Guide

This report provides a collection of articles on Healthcare Security.

Added: October 12, 2018
image from Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

This RAND Perspective suggests that technological develop- ments and social dynamics are working in tandem to shift society into hyperdrive, which can usher in unprecedented security concerns. Despite the potential for increased speed as 2040 nears, the authors assert that this phase of acceleration is neither uniform nor determin- istic. Without knowing the future, we can still have the foresight to prepare for security in an age of increasing speed and find value in having collaborative discussions about the role of speed as a catalyst within future global risk and security.

(more available)
Added: October 12, 2018
image from State of Mac Security 2016:Enterprise Mac Security

State of Mac Security 2016:Enterprise Mac Security

The State of Mac Security Report takes a pulse check of Mac enterprise adoption, examines the reasons behind their increased popularity and crucially, how to overcome the security risks they pose.

(more available)
Added: October 12, 2018
image from State of the Internet Security Report Q1 2018

State of the Internet Security Report Q1 2018

This Quaterly report continues Akamai’s breakdown of the internet security events that occurred in the first Quarter of 2018.

Added: October 12, 2018
image from The Dangers Of Smart City Hacking

The Dangers Of Smart City Hacking

This paper offers insight into smart cities and the dangers of exposed devices on the network.

Added: October 12, 2018
image from The Dirty Secrets Of Network Firewalls

The Dirty Secrets Of Network Firewalls

In late 2017, Sophos sponsored an independent research study into the state of network security in mid-sized organizations across the globe. This research program explored the experiences, concerns, and future needs of IT managers, with particular focus on firewalls and network defenses.

(more available)
Added: October 12, 2018
image from The Distributed Organization And The Demise Of Traditional Web Gateways

The Distributed Organization And The Demise Of Traditional Web Gateways

In this paper, they look at how most organizations have shifted from centralized to distributed operations, and what that change means from a cybersecurity perspective. They also examine the deficiencies of traditional on-prem, hybrid, and all-cloud secure web gateway solutions.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 53
  • 54
  • 55
  • 56
  • 57
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 21, 2025 20:09 UTC (build b1d7be4)