Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware Defenses

Below you will find reports with the tag of “Malware Defenses”

image from State of Malware

State of Malware

This report discusess malware attacks and data from the year 2016 and makes predictions for 2017.

Added: October 26, 2018
image from State Of The Endpoint 2017

State Of The Endpoint 2017

This report seeks to provide answers to many questions related to the failures of endpoint security that are occuring even though there has been a shift in technology and strategy.

(more available)
Added: October 26, 2018
image from The ABC's Of Inline Security

The ABC's Of Inline Security

The goal of this book is to clarify the most frequently encountered concepts of inline security and be a resource as you develop your network security architecture. For each of the 20 terms included, they provide a simple definition, common use cases, and important considerations for deployment.

(more available)
Added: October 26, 2018
image from The State Of Incident Response 2017

The State Of Incident Response 2017

This report is based on a survey that revealed new data that companies are struggling to keep up with the demands of their security needs due lack of resources, both on the security tools sid and personnel side.

(more available)
Added: October 26, 2018
image from Threats Report - December 2016

Threats Report - December 2016

An interview-based report, drawing from interviews of 400 security professionals. Covers topics such as the current state of SOC design, ransomware, and the rise of malware in otherwise legitimate software.

(more available)
Added: October 26, 2018
image from Defending Government Against Ransomware Attacks

Defending Government Against Ransomware Attacks

This paper takes a look at cloud sandboxing and how that can be used to protect governments from Ransomware.

Added: October 25, 2018
image from Global Threat Intelligence Report

Global Threat Intelligence Report

From the Report, “This year’s GTIR utilizes the Center for Internet Security’s Critical Security Controls to identify controls that can be effective at each stage of the Lockheed Martin Cyber Kill Chain® (CKC) . By ensuring that controls exists for each stage of the CKC, organizations can increase their ability to disrupt attacks . We’ve dedicated an entire section and case study to a Practical Application of Security Controls to the Cyber Kill Chain.”

(more available)
Added: October 25, 2018
image from Incident Report: In The Nick Of Time

Incident Report: In The Nick Of Time

This short report analyzes a specific threat incident.

Added: October 25, 2018
image from Investigation: WannaCry Cyber Attack And The NHS

Investigation: WannaCry Cyber Attack And The NHS

This report, out of Great Britain, focuses on the WannaCry Cyber Attack and what they learned in their investigation.

Added: October 25, 2018
image from IT Security at SMBs: 2017 Benchmarking Survey

IT Security at SMBs: 2017 Benchmarking Survey

This report presents the results of an in-depth primary market research survey of cyber security decision-makers in small to mid-sized businesses in the United States, conducted during August and September 2017. The goal of their research was to understand how SMBs, undertake decision-making in the context of their internet security, how they evaluate security solutions, and their budgetary concerns.

(more available)
Added: October 25, 2018
image from Minerva's 2016 Year In Review

Minerva's 2016 Year In Review

Released in 2017, this report details the cyberthreats that Minerva dealt with in 2016.

Added: October 25, 2018
image from Protecting Against Tomorrow's Malware Attacks Today

Protecting Against Tomorrow's Malware Attacks Today

This article from the UK discusses ways that organizations can protect themselves from future Malware attacks.

Added: October 25, 2018
image from SANS Survey on Security Optimization

SANS Survey on Security Optimization

This report discusses the proper workflows in Security Optimization.

Added: October 25, 2018
image from Security Intelligence Report Volume 21

Security Intelligence Report Volume 21

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 25, 2018
image from SilverTerrier: Rise Of Nigerian Business Email Compromise

SilverTerrier: Rise Of Nigerian Business Email Compromise

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 25, 2018
image from Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

This report provides an inside look at a threat being downloaded on Google Play.

Added: October 25, 2018
image from University of Kent Computing Survey

University of Kent Computing Survey

This is a report from Kent University in Canterbury, UK. It details the findings from their online survey which gives a better picture of the prevalence and impact of cybercrime victimization, cyber security practices, and risks as seen by a sample of the UK population.

(more available)
Added: October 25, 2018
image from Vendor Landscape Cloud Workload Security Solutions

Vendor Landscape Cloud Workload Security Solutions

As businesses continue to adopt both infrastructure-as-a-service (iaaS) and platform -as-a-service (PaaS) cloud platforms, S&r pros struggle to protect their organization’s valuable data while minimizing the threat surface of cloud and hybrid cloud workloads. Cloud workload security (CWS) solutions provide automated and layered controls to secure configurations, network, applications, and storage of hybrid cloud hypervisors and workloads. this report provides S&r pros with an overview of the CWS vendor landscape, critical selection criteria, and key vendor differentiation.

(more available)
Added: October 25, 2018
image from 2015 Breach Preparedness and Response Study

2015 Breach Preparedness and Response Study

In 2013, ISMG and FireEye teamed up to survey security leaders about advanced threats and breach response. Among the findings: Only 20 percent of respondents rated their incident response programs “very effective,” and they were most concerned about their abilities to detect and contain APT/malware quickly and completely.

(more available)
Added: October 24, 2018
image from 2016 Cyber Threat Study

2016 Cyber Threat Study

This study, analyzes cyber threats from the years 2014 through 2016.

Added: October 24, 2018
image from Cybercrime Tactics And Techniques Q1 2017

Cybercrime Tactics And Techniques Q1 2017

The second edition of this report, looking at noteable threats during the first three months of the year.

Added: October 24, 2018
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)