Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

InfoSec Market

Below you will find reports with the tag of “InfoSec Market”

image from US Senate Subcomittee On Data Security And Bug Bounties

US Senate Subcomittee On Data Security And Bug Bounties

This is a transcript of a February 2018 US Senate meeting that discussed Data Security and the hacking community.

Added: October 21, 2018
image from Advancing To Bot Management And Security

Advancing To Bot Management And Security

This report discusses the use of Bots in managing security risks for an organization. It specifically discusses the issures related to credential stuffing.

(more available)
Added: October 20, 2018
image from Cyber Value at Risk

Cyber Value at Risk

This paper was written to help Enterprises prioritize cyber security activities in real time based on potential financial loss.

Added: October 20, 2018
image from Exposé Of A Credit Card Black Market

Exposé Of A Credit Card Black Market

This short report takes a look at cybersecurity related Credit Card Fraud.

Added: October 20, 2018
image from Biometrics: Introducing The Future Of Authentication

Biometrics: Introducing The Future Of Authentication

This report takes a look at Biometrics and how it can become a great cybersecurity measure.

Added: October 19, 2018
image from Making Threat Intelligence Actionable

Making Threat Intelligence Actionable

From the report, “AED is an acronym we‘ve coined, short for “Acquire, Enrich, Detect.” It describes the process we use internally to collect threat intelligence and actualize our ability to identify when networks are under attack. We do this in the shortest possible time, with the highest degree of confidence, by looking ONLY at the raw network traffic.”

(more available)
Added: October 18, 2018
image from A Holistic Approach To Identity Managing For The Internet Of Things

A Holistic Approach To Identity Managing For The Internet Of Things

This whitepaper will introduce this new hierarchy of IoT IdM requirements. It will explain how enterprises and governmental agencies should employ a new generation of Cloud-based IdM solutions that can scale to meet today’s escalating IoT security requirements, and enable organizations to fulfill the promise of today’s connected world.

(more available)
Added: October 17, 2018
image from Cyber-Security Perceptions And Realities: A View From The C-Suite

Cyber-Security Perceptions And Realities: A View From The C-Suite

This Report is based on the findings of a survey that sought to understand the priorities and viewpoint of the Executive members of multiple organizations around the world, as pertains to cyber-secuirty issues.

(more available)
Added: October 17, 2018
image from The Case For Software Security

The Case For Software Security

This E-book discusses the importance of securing software.

Added: October 17, 2018
image from Farewell To Audit Season

Farewell To Audit Season

This report discusses the new reality that audits and compliance are no longer a seasonal issue. It lays out some good steps for daily audits for the sake of compliance.

(more available)
Added: October 16, 2018
image from Hacking Back Without Cracking Up

Hacking Back Without Cracking Up

From the paper, “This paper aims, in the first place, to put a concrete proposal on the table. It is not a panacea; it is a plausible way forward. We will start by explaining our proposal in detail and the problems we believe it would solve. We then discuss the proposal’s strategic rationale at a higher level, how it compares to various past and current practices, and why concerns about the dangers are considerably exaggerated. We conclude by considering the specific legal changes the proposal would require.”

(more available)
Added: October 16, 2018
image from Midyear Security Report 2015

Midyear Security Report 2015

Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.

(more available)
Added: October 16, 2018
image from Written Testimony US House Committee On Energy And Commerce

Written Testimony US House Committee On Energy And Commerce

This is the transcript of testimony given before the US House Committee On Energy And Commerce.

Added: October 16, 2018
image from Beware Of The 64-Bit Malware

Beware Of The 64-Bit Malware

The 64-bit Windows operating system is increasing its market share and becoming the prevalent system in most business environments. Its growing popularity is also attracting more attackers and slowly reshaping the Windows threat landscape. Cybersecurity teams must gain a deep understanding of 64-bit systems, and the different malware variants that can infiltrate and attack them, especially as the threat expands into additional operating systems, such as Linux and macOS.

(more available)
Added: October 15, 2018
image from Cyber Security Considerations For Financial Institutions

Cyber Security Considerations For Financial Institutions

This paper discusses the issues that are caused by, “technology innovation and spearheaded by a generation that expects a seamless customer experience, the financial services landscape is undergoing fundamental change, which will no doubt influence the industry’s future cyber security considerations.”

(more available)
Added: October 15, 2018
image from Guerilla Ad Clicker Targets Android Users

Guerilla Ad Clicker Targets Android Users

This report takes a look at a threat that specifically attacks Android users.

Added: October 15, 2018
image from 2017 Data Threat Report Global Edition

2017 Data Threat Report Global Edition

This report from 2017 is based on a survey conducted during October and November of 2016. They surveyed over a thousand senior security executives from across the globe, including from key regional markets in the US, UK, Germany, Japan, Australia, Brazil, and Mexico, and key segments such as federal government, retail, finance, and healthcare.

(more available)
Added: October 14, 2018
image from Evolution Of Cloud In Education

Evolution Of Cloud In Education

Vector Consulting was commissioned by Cisco Australia and New Zealand to better understand the role and impact of cloud in higher education and training. For the purposes of this report `cloud’ is predominantly focused on infrastructure as a service or cloud-based infrastructure. The study included desktop research, targeted interviews and a comprehensive survey, which forms the basis for this report. The survey was distributed electronically to Australian and New Zealand institutions to better understand their current views about where cloud was having the most impact and how they were planning for cloud. The survey was in field for two weeks and all individual responses were provided.

(more available)
Added: October 14, 2018
image from Fortinet Threat Landscape Report Q1 2017

Fortinet Threat Landscape Report Q1 2017

In this report, you’ll find a few highlights of what FortiGuard Labs analysts gleaned from Q1 intelligence collections. After that, they hope you’ll hang around while they dig deep into the threat landscape to unearth nuggets of insight you definitely won’t want to miss.

(more available)
Added: October 14, 2018
image from App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

This report seeks to clarify how app-centric security approaches can aid flexibility in a rapidly changing mobile world.

Added: October 13, 2018
image from State of Mac Security 2016:Enterprise Mac Security

State of Mac Security 2016:Enterprise Mac Security

The State of Mac Security Report takes a pulse check of Mac enterprise adoption, examines the reasons behind their increased popularity and crucially, how to overcome the security risks they pose.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 12:08 UTC (build b1d7be4)