Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from 2022 Attack Surface Management Maturity Report

2022 Attack Surface Management Maturity Report

The 2022 Attack Surface Management Maturity Report has been produced by Cybersecurity Insiders, the 500,000 member online community of information security professionals, to explore the current state, exposures, and priorities that organizations need to consider to fortify their security posture.

(more available)
Added: July 5, 2022
image from 2022 XDR Report

2022 XDR Report

Evolving security threats, exponential data growth, increased complexity, and a continuing cybersecurity shill shortage has given rise to a new category of security solutions called Extended Detection and Response (XDR). Red Piranha and Cybersecurity Insiders conducted a comprehensive survey to reveal the latest XDR trends and challenges in managing XDR, what XDR might replace, and how organizations select security technologies and providers.

(more available)
Added: July 5, 2022
image from Insider Risk Report 2022

Insider Risk Report 2022

The 2022 Insider Risk Report is driven by real data observed as part of actual investigations of real customers with whom DTEX detected and responded to potential insider risk incidents before a breach occurred.

(more available)
Added: July 5, 2022
image from Taking control of security operations

Taking control of security operations

The threat landscape is constantly evolving- and the tools you used to protect your business yesterday certainly won’t keep you safe tomorrow. In this white paper, you’ll learn three ways an intelligent, integrated approach can streamline your security operations.

(more available)
Added: June 30, 2022
image from SANS 2022 Ransomeware Defense Report

SANS 2022 Ransomeware Defense Report

In this white-paper, we address both high-level concepts: With respect to ransomware, what are the current adversary trends, and then what can organizations do to defend themselves (or better defend themselves)? The basic concept of ransomeware remains the same: Encrypt data and demand money for decryption.

(more available)
Added: June 28, 2022
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

The CDR is the most geographically comprehensive, vendor-agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches, the CDR surveys the perceptions of IT security professionals, gaining insights into how they see the world.

(more available)
Added: June 23, 2022
image from 2022 Envisions Critical Threat Report

2022 Envisions Critical Threat Report

Amid our worldwide bedlam, this report is aimed at informing for the purposes of preparation. Whether you find yourself in the midst of government affairs, technology management, or business operations, the state of rising factors impacts nearly every country, either directly or indirectly, and provides a ripe setting for cyberattacks to thrive. Based upon research conducted and shared amongst our various practices in DevSecOps, Offensive Security, Governance-Risk-Compliance, Threat Intelligence, and Research, we have completed our overall analysis to focus on the following evolving threats as we navigate through 2022.

(more available)
Added: June 21, 2022
image from Radware 5G Protection

Radware 5G Protection

Service providers are undergoing a technological revolution, transforming their networks and computing infrastructure to dramatically change the user experience and support new services in an app-driven world tailored to industry and business objectives. To do so, service providers are embracing ultra-low-latency designs, fully automated software delivery and increased levels of operating efficiency.

(more available)
Added: June 21, 2022
image from Mobile Banking Heists: The Global Economic Threat

Mobile Banking Heists: The Global Economic Threat

In this report, we examine 10 prolific banking trojans targeting Android mobile apps of users worldwide, detailing their features and capabilities. We also detail what makes each malware family different highlighting the unique and advanced malicious features that make each banking trojan family unique. A complete list of all 639 financial applications covering banking, investment, payment, and cryptocurrency services and the different banking trojan families targeting each is provided in Appendix A.

(more available)
Added: June 21, 2022
image from Ransomware Threat Report 2022

Ransomware Threat Report 2022

As these ransomware gangs and RaaS operators find new ways to remove technical barriers and up the ante, ransomware will continue to challenge organizations of all sizes in 2022. As a result, ransomware has become one of the top threats in cybersecurity and a focus area for Palo Alto Networks. This report provides the latest insights on established and emerging ransomware groups, payment trends, and security best practice.

(more available)
Added: June 16, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. They’re also implementing the appropriate security controls to ensure secure access to applications. In this report, we’ll look at how companies are currently securing remote work and what makes a solid and secure remote access strategy.

(more available)
Added: June 15, 2022
image from Blackberry 2022 Threat Report

Blackberry 2022 Threat Report

The Blackberry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a high-level look at issues affecting cybersecurity across the globe, both directly and indirectly. It covers elements of critical infrastructure exploitation, adversarial artificial intelligence (Al), initial access brokers (IABs), critical event management (CEM), extended detection and response (XDR), and other issues shaping our current security environment.

(more available)
Added: June 13, 2022
image from The State of Cybersecurity 2022 Trends

The State of Cybersecurity 2022 Trends

Arctic Wolf’s 2022 Security Trends Report provides insight into the current and future state of these cybersecurity teams as they attempt to move their security programs forward while dealing with an ever-evolving threat environment. Our research findings show that ransomware, phishing and vulnerabilities don’t just monopolize headlines, they’re taking up security professionals’ headspace, too. Defending an increasing number of threats from attackers with far more resources feels like a lost cause too many businesses.

(more available)
Added: June 10, 2022
image from Deepwatch Threat Intelligence 2022

Deepwatch Threat Intelligence 2022

In 2021, the industry saw a transition into threat actor separation of duties, with an increase in groups focused on obtaining and selling access to victims (Initial Access Brokers). In observing this trend, Deepwatch has taken note of the proliferation of Initial Access Brokers and how it correlates with a shift in focus, away from specific industries and towards attacks of opportunity. As this trend continues, more emphasis must be placed on risk management of organizations’ internet exposure.

(more available)
Added: June 8, 2022
image from CyberCrime Trends and Highlights Q3 2021

CyberCrime Trends and Highlights Q3 2021

From Q2 to Q3 2021, ransomware gained increasing attention. In Q3 2021, threat actors also continued mass exploitation of vulnerabilities in systems, including those in Microsoft Exchange.

(more available)
Added: May 16, 2022
image from Quantifying the financial savings Protective DNS (PDNS) brings to the UK public sector

Quantifying the financial savings Protective DNS (PDNS) brings to the UK public sector

This report provides an analysis of the DNS queries blocked by Protective DNS, finds commonalities among the end users that are protected, and uses a financial model to estimate the value of the threat prevention provided by Protective DNS to the UK economy.

(more available)
Added: May 11, 2022
image from Threat Landscape Report Q2 2018

Threat Landscape Report Q2 2018

The Fortinet Threat Landscape Report Q2 2018 features a healthy dose of international intrigue, major disruptions, global infections, innovative malware, clever heists, and more.

(more available)
Added: May 5, 2022
image from M-Trends 2021

M-Trends 2021

As ransomware operators were attacking state and municipal networks alongside hospitals and schools, a global pandemic response to COVID-19 necessitated a move to remote work for a significant portion of the economy. Many security teams were forced to suspend wide-ranging analyses around the adoption of remote work policies and instead focus on a supply chair attack from a trusted platform.

(more available)
Added: April 28, 2022
image from M-Trends 2022

M-Trends 2022

M-Trends provides an inside look at the evolving cyber threat landscape directly from global incident response investigations and threat intelligence analysis of high-impact attacks and remediations around the globe.

(more available)
Added: April 28, 2022
image from 2021 Webroot BrightCloud Threat Report

2021 Webroot BrightCloud Threat Report

The threat intelligence, trends and details presented in the 2021 Webroot BrightCloud Threat Report are based on data continuously and automatically captured by the Webroot Platform, which is the proprietary machine learning-based architecture that powers all of our Webroot protection and BrightCloud services.

(more available)
Added: April 25, 2022
image from Threat Intelligence Executive Report 2021 Vol. 5

Threat Intelligence Executive Report 2021 Vol. 5

The Secureworks Counter Threat (CTU) research team analyzes security threats and helps organizations protect their systems. During July and August 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends and identified lessons to consider.

(more available)
Added: April 21, 2022
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 08:09 UTC (build b1d7be4)