Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from The Four Pillars Of Modern Vulnerability Management

The Four Pillars Of Modern Vulnerability Management

This report breaks down four strategic pillars of handling vulnerability management.

Added: October 12, 2018
image from The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report highlights notable threats, incidents and trends observed during the previous year.

Added: October 12, 2018
image from Threat Advisory: CardCrypt

Threat Advisory: CardCrypt

This is a threat advisory for CardCrypt

Added: October 12, 2018
image from Threats Report - March 2016

Threats Report - March 2016

This report discusses two key topics: 1) An Intel Security survey that found that awareness was very high and, 97% of those interviewed, said that sharing cyber intelligence was valuable and 2) They explore the Adwind Java-based Trojan. It also includes the usual key points about predictions and threat summaries.

(more available)
Added: October 12, 2018
image from Using Deception to Hunt Cyber Attackers

Using Deception to Hunt Cyber Attackers

From the report, “Today, there are a great many detection (identification and tracking) tools. However, there is not enough emphasis on trapping, resulting in a lack of effective trapping tools and techniques. An effective technique for automating the tracking of cyber attackers and, once found, trapping them, is deception. When implemented well, deception can automate and scale the hunting process, accurately identifying and tracking attackers, and trapping them to protect valuable assets while reducing valuable human resources in this never-ending competition of wits.”

(more available)
Added: October 12, 2018
image from Validating The New World Of 400 Gigabit Ethernet: The Return Of Industry Benchmarking

Validating The New World Of 400 Gigabit Ethernet: The Return Of Industry Benchmarking

Read this white paper to understand why this is a critical time to renew efforts to compare and benchmark the performance of these new network products and devices.

(more available)
Added: October 12, 2018
image from Winter 2018 Netskope Cloud Report

Winter 2018 Netskope Cloud Report

This quarterly report from Netskope details information gleaned from providing cloud security to their clients.

Added: October 12, 2018
  • ««
  • «
  • 53
  • 54
  • 55
  • 56
  • 57
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 12:08 UTC (build b1d7be4)