Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from 2018 Malware Forecast

2018 Malware Forecast

In this report, they review malicious activity that SophosLabs analyzed and protected their clients from in 2017. They take that data and project what can be expected from 2018.

(more available)
Added: October 18, 2018
image from 2018 Security Pressures Report

2018 Security Pressures Report

Based on a survey of 1,600 information security decision-makers and influencers in six countries, the 2018 Security Pressures Report delves into keeping businesses safeguarded against cyber threats, attacks and compromises.

(more available)
Added: October 18, 2018
image from Addressing Mobile Risk: Why Network Traffic Analysis Isn't Enough

Addressing Mobile Risk: Why Network Traffic Analysis Isn't Enough

In this whitepaper, they explain why enterprises need to take a mobile first approach to the security of employees and the data they access and share via apps on their mobile devices. They’ll show you why relying on network traffic analysis alone is insufficient to protect against mobile app threat risk, leaving blind spots that weaken your security posture in an increasingly mobile-centric world.

(more available)
Added: October 18, 2018
image from Are Your Employees A Cybersecurity Risk?

Are Your Employees A Cybersecurity Risk?

Today’s threat landscape is rapidly evolving, which means it is simply not enough for organizations to roll out an annual security training program and then pat themselves on the back for a job well done. Companies need to consistently invest in training and keep their employees updated on the latest vulnerabilities.

(more available)
Added: October 18, 2018
image from ASEC Report Volume 87 Q2 2017

ASEC Report Volume 87 Q2 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 2nd Qtr. of 2017.

(more available)
Added: October 18, 2018
image from Business Risk Intelligence Decision Report: 2018 Mid Year Update

Business Risk Intelligence Decision Report: 2018 Mid Year Update

This report provides insight into several of the business risk factors facing organizations in 2018. It specifically reviews events from all around the globe.

(more available)
Added: October 18, 2018
image from CISOs Investigate:Endpoint Security

CISOs Investigate:Endpoint Security

The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven risk and technology decisions.

(more available)
Added: October 18, 2018
image from Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

The article uses the world’s 1,000 largest companies as a sample to help us better understand the extent to which organizations are effected by cyber threats and how threat actors my be looking to exploit these credentials.

(more available)
Added: October 18, 2018
image from Creating Resilience in the Digital Frontier

Creating Resilience in the Digital Frontier

This paper lays out the 5 steps necessary for the foundation of an effective cyber risk management program.

Added: October 18, 2018
image from Cyber Incident And Breach Trends Report

Cyber Incident And Breach Trends Report

This report takes a look at the major incidents that took place in 2017.

Added: October 18, 2018
image from Cyber Risk Report 2016

Cyber Risk Report 2016

From the report, “In this report we provide a broad view of the 2015 threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.”

(more available)
Added: October 18, 2018
image from Cyber Threats To The High Tech And IT Industry

Cyber Threats To The High Tech And IT Industry

Get a threat outlook for high tech and IT sectors as their relevance to economic, intelligence and security concerns make them more valuable targets.

(more available)
Added: October 18, 2018
image from Espionage As A Service

Espionage As A Service

This brief takes a look at the espionage as a service industry and how it can help businesses become secure.

(more available)
Added: October 18, 2018
image from Flipping the Economics of Attacks

Flipping the Economics of Attacks

How much does it cost technically proficient adversaries to conduct successful attacks, and how much do they earn? In this report, they look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.

(more available)
Added: October 18, 2018
image from Generations of Machine Learning In Cybersecurity

Generations of Machine Learning In Cybersecurity

In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. In addition, the paper seeks to explain that while a great deal of progress has been made in the evolution of machine learning’s application to cybersecurity challenges, there remains an immense amount of opportunity for innovation and advancement in the field, and they expect the sophistication of applications of machine learning to continue to evolve over time.

(more available)
Added: October 18, 2018
image from Global Risks 2015

Global Risks 2015

From the preface to the report, “As in previous years, the Report is based on the annual Global Risks Perception Survey, completed by almost 750 members of the World Economic Forum’s global multistakeholder community. In addition to the special section exploring the evolving security landscape in an era of uncertainty, the Report presents deep-dive discussions of risks to the stability of societies posed by the (dis)empowered citizen, who is empowered by technology but feels disempowered by traditional decision-making processes. It also discusses the societal consequences of climate change with a focus on food and water crises and the threat of global pandemics.”

(more available)
Added: October 18, 2018
image from Global Threat Report Q4 2017

Global Threat Report Q4 2017

This report takes a look at the mobile threat events for the last quarter of 2017.

Added: October 18, 2018
image from GTIC Monthly Threat Report July 2017

GTIC Monthly Threat Report July 2017

This monthly threat report takes a look at the month of July 2017. More specifically, it takes a look at why the GDPR matters, observations from the Cyber Kill Chain, and buffer flow VULNS.

(more available)
Added: October 18, 2018
image from Hacking Healthcare IT in 2016

Hacking Healthcare IT in 2016

This report begins with the following statement, “Among all of America’s critical infrastructures, the healthcare sector is the most targeted and plagued by perpetual persistent attacks from numerous unknown malicious hackers, intent on exploiting vulnerabilities in their insecure and antiquated networks in order to exfiltrate patient health records.” The paper then goes on to discuss the IT struggles of the healthcare sector.

(more available)
Added: October 18, 2018
image from How To Mitigate Five IT Problems Affecting The Financial Industry

How To Mitigate Five IT Problems Affecting The Financial Industry

Read this whitepaper to see how you can mitigate the following five financial services industry IT challenges. Minimize breaches, reduce cyber theft, use technology to improve network performance, improve compliance, and leverage technology to provide a competitive advantage.

(more available)
Added: October 18, 2018
image from Into The Web Of Profit

Into The Web Of Profit

This book provides excellent research and an in-depth study of cybercrime criminals and money.

Added: October 18, 2018
  • ««
  • «
  • 58
  • 59
  • 60
  • 61
  • 62
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)