Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from To The Point: Reporting Cybersecurity and IT Risk to the Board

To The Point: Reporting Cybersecurity and IT Risk to the Board

This report provides helpful insight into why board executives don’t understand Cybersecurity issues. It also adds helpful advice for how to convince the board of the importance of these issues.

(more available)
Added: October 22, 2018
image from 2017 Internet Security Threat Report, Volume 22

2017 Internet Security Threat Report, Volume 22

Symantec has established the largest civilian threat collection network in the world, and through that has developed the Symantec Global Intelligence Network. Through that development comes this report based on their experiences in 2016.

(more available)
Added: October 21, 2018
image from 2017 Security Annual Volume 2 - Luminary Interviews

2017 Security Annual Volume 2 - Luminary Interviews

This paper provides interviews with a variety of well known individuals in the cyber security industry.

Added: October 21, 2018
image from 2017 State Of Cybercrime

2017 State Of Cybercrime

The goal of this report is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become smarter and safer.

(more available)
Added: October 21, 2018
image from 2018 Cyber Threat Intelligence Estimate

2018 Cyber Threat Intelligence Estimate

This report is based on security digital footprint assessments conducted in 2017. It offers predictions for 2018 and analysis of 2017.

(more available)
Added: October 21, 2018
image from 2018 CyberThreat Defense Report

2018 CyberThreat Defense Report

This report advertises itself as a “vendor-agnostic” report. Now in its fifth year, this report has become a staple among IT security leaders and practitioners. They stick to the usual suspects in cyber threats, but also outline some new areas related to Cloud investment, app containers, reliance on mobile devices, and the continuing damage of ransomware.

(more available)
Added: October 21, 2018
image from 5th Annual State of Application Security Report

5th Annual State of Application Security Report

Arxan’s 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality

Added: October 21, 2018
image from 6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

This white paper presents the key best practices for law firms of all sizes that want to to enable cloud-based file sharing while protecting sensitive data.

(more available)
Added: October 21, 2018
image from 6 Key Security Requirements for Next Generation Mobile Networks

6 Key Security Requirements for Next Generation Mobile Networks

Mobile network operators (MNOs) are evolving rapidly to deploy transformative networks—4G, 5G, SDN/NFV. Meanwhile they are battling a new and different cyber attack landscape that could compromise BOTH their networks AND their subscribers. Network and subscriber protection are no longer separate problems in this new digital age. Legacy security solutions are inadequate. A new approach to security is needed—with a focus on PREVENTION —not just a reaction to prior known threats. Adopting a prevention posture enables operators to get ahead of the evolving sophistication of attackers.

(more available)
Added: October 21, 2018
image from APT37 (Reaper) The Overlooked North Korean Actor

APT37 (Reaper) The Overlooked North Korean Actor

This report takes a look at a North Korean CyberEspionage Groub.

Added: October 21, 2018
image from Banking On The Customer To Make Open Banking A Success

Banking On The Customer To Make Open Banking A Success

This paper offers a unqiue look into the complications surrounding that adoption of compliant banking solutions. It seeks to help create simple but compliant solutions that customers accept.

(more available)
Added: October 21, 2018
image from Cryptocurrency Mining Malware

Cryptocurrency Mining Malware

This e-book provides a helpful analysis of malware that mines cryptocurrency.

Added: October 21, 2018
image from Cybersecurity: Labor Market Analysis And Statewide Survey Results

Cybersecurity: Labor Market Analysis And Statewide Survey Results

This report takes a look at the labor market in California, specifically as it relates to Cybersecurity. It offers insight into the growing need for more cybersecurity employees, as well as educational changes that can be made to fill the void.

(more available)
Added: October 21, 2018
image from DDoS Threat Report Q3 2017

DDoS Threat Report Q3 2017

This report takes a look at the DDoS threats that occurred in the third quarter of 2017.

Added: October 21, 2018
image from Email Encryption Secure File Transfer Best Practice

Email Encryption Secure File Transfer Best Practice

This report provides a discussion about the best practices for Email encryption.

Added: October 21, 2018
image from ENISA Threat Taxonomy: A tool for structuring threat information.pdf

ENISA Threat Taxonomy: A tool for structuring threat information.pdf

The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015. The consolidated threat taxonomy is an initial version: in 2016, ENISA plans to update and expand it with additional details, such as definitions of the various threats mentioned.

(more available)
Added: October 21, 2018
image from Enterprise Mobile Security Pulse Report Q3 2017

Enterprise Mobile Security Pulse Report Q3 2017

This report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during application analysis.

(more available)
Added: October 21, 2018
image from Enterprise Phishing Resiliency And Defense Report

Enterprise Phishing Resiliency And Defense Report

This annual report takes a specific look at phishing campaigns in 2017.

Added: October 21, 2018
image from Future Vision For Secure Mobility

Future Vision For Secure Mobility

From The Report, “This article is fifth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides a future vision for how mobile security is likely to evolve in the context of enterprise evolution.”

(more available)
Added: October 21, 2018
image from GTIC Monthly Threat Report November 2017

GTIC Monthly Threat Report November 2017

This monthly threat report takes a look at the month of November 2017. Specifically, it looks at IoT Attacks, Hidden Cobra, and the Fancy Bear exploit of a Microsoft VULN.

(more available)
Added: October 21, 2018
image from Guidelines For Increasing Public Sector Cybersecurity

Guidelines For Increasing Public Sector Cybersecurity

This paper discusses the issues that revolve around cybersecurity in the public sector.

Added: October 21, 2018
  • ««
  • «
  • 52
  • 53
  • 54
  • 55
  • 56
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 00:08 UTC (build b1d7be4)