Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware Defenses

Below you will find reports with the tag of “Malware Defenses”

image from Worldwide Security Spending Guide

Worldwide Security Spending Guide

The Worldwide Security Spending Guide examines the security opportunity from a technology, industry, company size, and geography perspective. This comprehensive database delivered via IDC’s Customer Insights query tool allows the user to easily extract meaningful information about the security technology market by viewing data trends and relationships and making data comparisons.

(more available)
Added: February 14, 2020
image from 2019 Cyberthreat Defense Report

2019 Cyberthreat Defense Report

A survey-based report with findings in four major areas: current security posture, perceptions and concerns, current and future investments, and practices and strategies.

(more available)
Added: February 12, 2020
image from 2020 Sonicwall Cyber Threat Report

2020 Sonicwall Cyber Threat Report

Sonicwall outlines the changes in the threat landscape in 2020 for companies to utilize.

Added: February 6, 2020
image from How Ransomware Attacks

How Ransomware Attacks

Most blogs or papers about crypto-ransomware typically focus on the threat’s delivery, encryption algorithms and communication, with associated indicators of compromise (IOCs). This research paper takes a different approach: an analysis of the file system activity or behaviors of prominent crypto-ransomware families (hereafter, simply called ransomware).

(more available)
Added: November 25, 2019
image from Fortinet Quarterly Threat Landscape Report Q2 2019

Fortinet Quarterly Threat Landscape Report Q2 2019

This is quarterly publication from Fortinet that looks in the current cyber security threats from April 1 to July 1.

(more available)
Added: October 1, 2019
image from Guardians Of The Cloud - 2019 Cloud Security Report

Guardians Of The Cloud - 2019 Cloud Security Report

This paper uses a unique and MARVEL-ous approach to provide insight into maintaining a robust cybersecurity posture in today’s fast-paced world.

(more available)
Added: September 18, 2019
image from 2019 Malware Report

2019 Malware Report

The 2019 Malware Report was produced by Cybersecurity Insiders and HelpSystems to reveal the latest malware security trends, challenges, and investment priorities.

(more available)
Added: July 10, 2019
image from Microsoft Security Intelligence Report: Volume 24

Microsoft Security Intelligence Report: Volume 24

This report provides insights culled from a year of security data analysis and hands-on lessons learned. Data analyzed includes the 6.5 trillion threat signals that go through the Microsoft cloud every day and the research and realworld experiences from our thousands of security researchers and responders around the world. In 2018, attackers used a variety of dirty tricks, both new (coin mining) and old (phishing), in their ongoing quest to steal data and resources from customers and organizations. Hybrid attacks, like the Ursnif campaign, blended social and technical approaches. As defenders got smarter against ransomware, a loud and disruptive form of attack, criminals pivoted to the more “stealth”, but still profitable, coin-miners.

(more available)
Added: July 10, 2019
image from Improving Cybersecurity Awareness In Undeserved Populations

Improving Cybersecurity Awareness In Undeserved Populations

This paper, published in partnership with the UC Berkeley Center for Long-Term Cybersecurity, highlights research indicating that “underserved” residents in San Francisco, California— including low-income residents, seniors, and foreign language speakers—face higher-than average risks of being victims of cyber attacks. They are less likely to know whether they have even been victimized by a cyber attack, and they have lower awareness of cybersecurity risks. Partly as a result, they are less likely to access online services. This cybersecurity gap is a new “digital divide” that needs to be addressed—with urgency—by the public and private sectors alike.

(more available)
Added: April 23, 2019
image from Mobile Security & BYOD Report

Mobile Security & BYOD Report

Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use in the enterprise. As mobility grows in the workplace, so do challenges from managing device access to handling the most pressing concerns of mobile security. The 2018 Mobile Security Report focuses on these security challenges and offers fresh insights on the state of securing mobility, the technology choices organizations are making, and their response to the growing security risks associated with enterprise mobility.

(more available)
Added: April 4, 2019
image from 2019 SonicWall Cyber Threat report

2019 SonicWall Cyber Threat report

To promote global awareness and facilitate important dialogues, SonicWall remains steadfast in its commitment to research, analyze and share threat intelligence via the 2019 SonicWall Cyber Threat Report.

(more available)
Added: April 4, 2019
image from The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm’s brand. To accelerate their performance in threat detection and response, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide™ report presents an analysis of the maturity and business value of the 18 technology categories that support Zero Trust threat detection and response. Security professionals should read this report to shape their firm’s investment approach to these technologies.

(more available)
Added: March 26, 2019
image from Worldwide Semiannual Security Spending Guide

Worldwide Semiannual Security Spending Guide

The Worldwide Semiannual Security Spending Guide examines the security spending opportunity from a country, industry, and technology perspective. This comprehensive database delivered via pivot table format or IDC’s Customer Insights query tool allows users to easily extract meaningful information about the core and next-generation security markets by viewing data trends and relationships and making data comparisons.

(more available)
Added: March 26, 2019
image from Would You Be Ready For A Cyber Attack?

Would You Be Ready For A Cyber Attack?

Business in the Community is delighted to present this report, which confirms where we all can play a role in better online security and how we – business leaders, think tanks, government – can achieve this. We encourage CEOs and business owners of all sizes to take actions after reading this report. If you are a small business owner, we hope it inspires you to implement the recommendations to be safer online. For larger businesses, we hope you will consider joining our call to action. By working together, we will be a step closer to achieving the National Cyber Security Centre’s vision to help: “make the UK the safest place to live and do business online”.

(more available)
Added: March 26, 2019
image from State of Application Services 2019 Report/ Focus On Americas

State of Application Services 2019 Report/ Focus On Americas

This report from F5 offers insights into key data regarding application services in the Americas.

Added: March 16, 2019
image from Cybersecurity In The City: Ranking America's Most Insecure Metros

Cybersecurity In The City: Ranking America's Most Insecure Metros

From the report, “To generate this report, Coronet analyzed an enormous set of data comprised of both access and service threats. The data originated from Wi-Fi and cellular networks, devices spanning all operating systems and public network connectivity infrastructure. The data was aggregated and evaluated based on potential damage that could be caused by attackers and existing vulnerabilities in the 55 most populated DMAs, which together account for almost 70 percent of the entire U.S. population. The ranked results have been aggregated into regions which closely resemble Nielsen DMAs. Coronet ranked each city that was analyzed from most insecure to least vulnerable, with the most insecure cities scoring a 6.5 and above.” Read on to find out more.

(more available)
Added: March 16, 2019
image from Microsoft Security Intelligence Report

Microsoft Security Intelligence Report

From The Report, “What you’re reading are insights culled from a year of security data analysis and hands-on lessons learned. Data analyzed includes the 6.5 trillion threat signals that go through the Microsoft cloud every day and the research and realworld experiences from our thousands of security researchers and responders around the world. In 2018, attackers used a variety of dirty tricks, both new (coin mining) and old (phishing), in their ongoing quest to steal data and resources from customers and organizations. Hybrid attacks, like the Ursnif campaign, blended social and technical approaches. As defenders got smarter against ransomware, a loud and disruptive form of attack, criminals pivoted to the more “stealth”, but still profitable, coin-miners.”

(more available)
Added: March 1, 2019
image from 2018 Application Security Report

2018 Application Security Report

From the report, “Business applications are critical business resources for companies of all sizes — and they’re increasingly under attack. To gain deeper insights into the state of application security, Cybersecurity Insiders conducted an in-depth study in partnership with the 400,000 member Information Security Community on LinkedIn. This report is the result of a comprehensive survey of 437 cybersecurity professionals designed to reveal the latest application security trends, how organizations are protecting applications, and what tools and best practices IT cybersecurity teams are prioritizing to find, fix and prevent vulnerabilities in next-gen applications.”

(more available)
Added: February 18, 2019
image from Misconceptions About Building a Machine Learning Platform For Risk

Misconceptions About Building a Machine Learning Platform For Risk

In this paper the CTO of Feedzai writes about several of the misconceptions related to organizations leveraging in-house resources to create their own machine learning system for risk. He discusses the lack of success surrounding those decisions.

(more available)
Added: February 13, 2019
image from Reducing Phishing Risk In The SOC

Reducing Phishing Risk In The SOC

This whitepaper is intended to help firms understand how security automation can accelerate analyst response time to incoming phishing alerts and minimize the impact of these malicious attacks on their environment.

(more available)
Added: February 12, 2019
image from 2018 Application Security Report

2018 Application Security Report

This report is based on the results of a comprehensive online survey of 437 cybersecurity professionals conducted from June through August 2018 to gain deep insights into the latest application security threats faced by organizations and the solutions to prevent and remediate them. The respondents range from executives to managers and IT security practitioners. They represent organizations of varying sizes across many industries.

(more available)
Added: February 12, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 20:08 UTC (build b1d7be4)