Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile device

Below you will find reports with the tag of “Mobile device”

image from 2022 Blackberry Threat Report Highlights

2022 Blackberry Threat Report Highlights

The cyber events of the past year included unprecedented supply chain attacks, assaults on critical infrastructure, and widespread vulnerabilities likely to haunt organizations for years. (more available)
Added: February 1, 2023
image from 2021 Global Automotive Cybersecurity Report

2021 Global Automotive Cybersecurity Report

As a leader in automotive cybersecurity and automotive cyber threat intelligence, Upstream Security continually monitors and analyzes worldwide cyber incidents to protect the automotive ecosystem from cyber threats and misuse. (more available)
Added: January 11, 2023
image from 2022 Global Automotive Cybersecurity Report

2022 Global Automotive Cybersecurity Report

This report was created by analyzing 900+ publicly reported incidents that occurred since 2010, with an increase of more than 225% in the number of incidents taking place in 2021 alone, when compared to 2018. (more available)
Added: January 11, 2023
image from 2023 Global Automotive Cybersecurity Report

2023 Global Automotive Cybersecurity Report

This report marks Upstream’s fifth annual report, uncovering the expanding and emerging automotive cybersecurity risks, and how they impact the entire smart mobility ecosystem. (more available)
Added: January 11, 2023
image from Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

Rise in Mobile Phishing Credential Theft Targeting U.S. Public Sector

To understand the challenges facing U.S. government agencies, Lookout analyzed data specific to our federal, state and local customers from the Lookout Security Graph. (more available)
Added: January 11, 2023
image from 2021 BYOD Security Report

2021 BYOD Security Report

The 2021 BYOD Security Report reveals these security challenges and offers fresh insights on the state of securing mobility, the technology choices organizations are making, and their response to the growing security risks associated with remote work and enterprise mobility. (more available)
Added: October 24, 2022
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

This 2021 Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available)
Added: October 18, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. (more available)
Added: October 18, 2022
image from Balancing Risk & Reward

Balancing Risk & Reward

This report is based on cybercrime attacks detected by the Digital Identity Network from July-December 2021, during near real-time analysis of consumer interactions across the customer journey, from new account creations, logins, payments and other non-core transactions such as password resets and transfers. (more available)
Added: September 28, 2022
image from Women in Cybersecurity: Spanning the Career Life Cycle

Women in Cybersecurity: Spanning the Career Life Cycle

For our survey, we targeted successful women working in varied roles in the cybersecurity community, and we queried them about everything from breaking into the field and gaining career momentum to choosing a specialty and finding ways to remain relevant. (more available)
Added: September 20, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is based on a comprehensive survey of 775 cybersecurity professionals conducted in January 2022, to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. (more available)
Added: August 26, 2022
image from 2022 Threat Review

2022 Threat Review

However, 2021 is most likely to be remembered as the year that ransomeware epidemic isn’t over, and it may not even have peaked, but the threat it poses to businesses, supply-chains and critical infrastructure is no longer in doubt, and the forces arrayed against it have never been so formidable. (more available)
Added: July 18, 2022
image from 2022 Attack Surface Management Maturity Report

2022 Attack Surface Management Maturity Report

The 2022 Attack Surface Management Maturity Report has been produced by Cybersecurity Insiders, the 500,000 member online community of information security professionals, to explore the current state, exposures, and priorities that organizations need to consider to fortify their security posture. (more available)
Added: July 5, 2022
image from Radware 5G Protection

Radware 5G Protection

Service providers are undergoing a technological revolution, transforming their networks and computing infrastructure to dramatically change the user experience and support new services in an app-driven world tailored to industry and business objectives. (more available)
Added: June 21, 2022
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

In the 2021 Dup Trusted Access Report, we’ll explore how companies are currently securing hybrid work and what makes a solid and secure remote access strategy. (more available)
Added: June 15, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. (more available)
Added: June 15, 2022
image from The 2019 Duo Trusted Access Report

The 2019 Duo Trusted Access Report

For The 2019 Duo Trusted Access Report, our data shows that Duo customers across all industries are starting to implement zero-trust security principles to secure their workforce. (more available)
Added: June 15, 2022
image from Blackberry 2022 Threat Report

Blackberry 2022 Threat Report

The Blackberry 2022 Threat Report is not a simple retrospective of the cyberattacks of 2021. It is a high-level look at issues affecting cybersecurity across the globe, both directly and indirectly. (more available)
Added: June 13, 2022
image from The State of Stalkerware in 2021

The State of Stalkerware in 2021

This report shows data from 2021 that was affected by stalkerware globally.
Added: April 13, 2022
image from 2022 Global Mobile Threat Report

2022 Global Mobile Threat Report

A review of mobile device application security, based upon a combination of data from Zimperium’s product and suvey based results.
Added: April 6, 2022
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

Drawing on Duo’s customer basis of millions of devices and the authentication traffic associated with them between June 2020 and May 2021, this report reviews trends in authentication methods and includes firmographic breakdowns. (more available)
Added: October 17, 2021
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 18
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 16:09 UTC (build 051771c)