Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

InfoSec Market

Below you will find reports with the tag of “InfoSec Market”

image from Predictive Malware Response Test

Predictive Malware Response Test

SE Labs tested a product from Cylance and sought to discover its weaknesses.

Added: December 29, 2018
image from Expanding Machine Learning Applications on the Endpoint

Expanding Machine Learning Applications on the Endpoint

This paper discusses one possible avenue for improving EDR which is the broader adoption of machine learning techniques.

Added: December 29, 2018
image from State of the Internet 2018

State of the Internet 2018

In this issue of the State of The Internet/Security report, they take a look back at some of the events they were a part of and the research the Akamai teams produced in the past 12 months. They also examine a few of the stories that formed the background in security this year.

(more available)
Added: December 14, 2018
image from High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows.

(more available)
Added: November 24, 2018
image from Now Tech: Container Security, Q4 2018

Now Tech: Container Security, Q4 2018

You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you’ll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security pros should use Forrester’s Now Tech report to understand the value they can expect from a container security provider and select vendors based on size and functionality.

(more available)
Added: November 20, 2018
image from Turla group using Neuron and Nautilus tools alongside Snake malware

Turla group using Neuron and Nautilus tools alongside Snake malware

This report provides new intelligence by the NCSC on two tools used by the Turla group to target the UK. It contains IOCs and signatures for detection by network defenders.

(more available)
Added: November 15, 2018
image from Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

This report offers insight into the Iranian threat agent Greenbug.

Added: November 15, 2018
image from 2017 Year In Review Report

2017 Year In Review Report

This Annual report discusses the events and changes in the cybersecurity landscape of 2017.

Added: October 26, 2018
image from Cyber Update: 2015 Cyber Insurance Profits and Performance

Cyber Update: 2015 Cyber Insurance Profits and Performance

A total of 117 US insurers were found to have underwritten cyber insurance in 2015. This paper has analyzed these filings and has outlined them to provide insights for insurers that either currently offer or seek to offer cyber insurance to help them benchmark and drive decisions on underwriting and reinsurance purchase.

(more available)
Added: October 26, 2018
image from Inside The Mind Of A Hacker 2.0

Inside The Mind Of A Hacker 2.0

This report takes you inside the mind of a hacker.

Added: October 26, 2018
image from SilverTerrier: The Next Evolution In Nigerian Cybercrime

SilverTerrier: The Next Evolution In Nigerian Cybercrime

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 26, 2018
image from 2015 Threats Report

2015 Threats Report

In this report, McAfee looks back on the past 5 years of cyber threats. They then breakdown two key points, 1) How do attackers enter a malware infected system and exfiltrate information and 2) Cyber attacks on graphic processing units and (GPU) devices.

(more available)
Added: October 25, 2018
image from 2017: Security Operations Challenges, Priorities, and Strategies

2017: Security Operations Challenges, Priorities, and Strategies

This report concludes that, security operations is fraught with people, process, and technology challenges, that improvement is a high priority, organizations are embracing security orchestration, and orchestration is becoming a centralized platform.

(more available)
Added: October 25, 2018
image from The State Of SOAR Report, 2018

The State Of SOAR Report, 2018

There is already a wealth of research that highlights the unending growth in security alerts, a widening security skills gap, and the ensuing fatigue that is heaped upon understaffed security teams. Demisto conducted a large study to delve deeper into these issues, their manifestations, and possible solutions. Their results yielded fascinating insights into the state of cybersecurity in businesses of all sizes.

(more available)
Added: October 25, 2018
image from Cloud Hard 2018 Security With A Vengeance

Cloud Hard 2018 Security With A Vengeance

In partnership with the Information Security Community, Bitglass surveyed over 570 cybersecurity and IT professionals to learn how organizations are approaching cloud security. Read on to learn about the state of traditional tools, security measures IT leaders are taking, and cloud priorities for 2018.

(more available)
Added: October 23, 2018
image from The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The purpose of this research is to examine trends in the benefits of threat intelligence and the challenges companies face when integrating threat intelligence with existing security platforms and technologies.

(more available)
Added: October 23, 2018
image from 2017 Security Annual Volume 1

2017 Security Annual Volume 1

This paper was written for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams.

(more available)
Added: October 22, 2018
image from Report Summary: Network Management Megatrends 2016

Report Summary: Network Management Megatrends 2016

This is the fourth megatrends study. For this latest version, they have carried forward a number of ongoing questions and threads that are designed to track how the network management landscape is changing over time. They’ve also included many new questions and queries intended to help us characterize and quantify the very latest technology trends. In particular, new questions were added in this report to begin assessing whether hybrid clouds, advanced analytics, and/or the Internet of Things were having an impact on network management tools and practices.

(more available)
Added: October 22, 2018
image from Unlocking B2B SaaS Growth With Identity Management

Unlocking B2B SaaS Growth With Identity Management

SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.

(more available)
Added: October 22, 2018
image from How To Stop Fraud With The Resources You Have

How To Stop Fraud With The Resources You Have

This is a handy guide to fraud protection management.

Added: October 21, 2018
image from Tech Report:Targeted Attacks On Defense Industry

Tech Report:Targeted Attacks On Defense Industry

This report, based on case studies, outlines the recent trends of cyberattacks on the defense industry.

Added: October 21, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 12:08 UTC (build b1d7be4)