Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile Device

Below you will find reports with the tag of “Mobile Device”

image from The Importance Of Knowing Your Device In A Mobile-First World

The Importance Of Knowing Your Device In A Mobile-First World

This white paper will examine “Know Your Device” (KYD) as a method to not only protect against fraud, but also enhance your customer’s digital channel experiences and compete in a crowded marketplace.

(more available)
Added: October 24, 2018
image from The Internet Of Things Requires A Security Rethink

The Internet Of Things Requires A Security Rethink

This paper takes a good look at the new era that is being ushered in by the Internet Of Things. It discusses the “perfect storm” that is being created by the issues and innovations ahead.

(more available)
Added: October 24, 2018
image from Understanding The Mobile Threat Landscape In 2018

Understanding The Mobile Threat Landscape In 2018

“2017 was a huge year for mobile security. Malicious actors returned with a vengeance and cyber attacks grew rapidly in sophistication. Ransomware outbreaks like WannaCry and Petya hit enterprises globally causing unparalleled disruption, new vulnerabilities like BlueBorne were discovered and malware variants grew more aggressive and prevalent by the day. This report will summarise the key mobile security trends that emerged in 2017, and summarise thoughts for the mobile threat landscape for the year ahead.”

(more available)
Added: October 24, 2018
image from Best Practices For Digital Data Security: Cybersecurity Recommendations For The Business Traveler

Best Practices For Digital Data Security: Cybersecurity Recommendations For The Business Traveler

This whitepaper takes a look at the cybersecurity considerations that a business traveler should keep in mind while on the move.

(more available)
Added: October 23, 2018
image from Cloud Hard 2018 Security With A Vengeance

Cloud Hard 2018 Security With A Vengeance

In partnership with the Information Security Community, Bitglass surveyed over 570 cybersecurity and IT professionals to learn how organizations are approaching cloud security. Read on to learn about the state of traditional tools, security measures IT leaders are taking, and cloud priorities for 2018.

(more available)
Added: October 23, 2018
image from Consumer Account Security Report 2016

Consumer Account Security Report 2016

The report describes consumers’ account security practices, their exposure to security incidents and their expectations for companies to protect their mobile and online accounts. Data are drawn from an online survey of 1,300 adults conducted in September 2016.

(more available)
Added: October 23, 2018
image from Enterprise Mobile: The New Threat Vector

Enterprise Mobile: The New Threat Vector

This paper discusses the new threat vector that has been created by bringing an enterprise into the mobile age.

Added: October 23, 2018
image from Mobile Access Optimization And Security For The Cloud Era

Mobile Access Optimization And Security For The Cloud Era

This short e-Book takes a look at the unique problems that are caused by mobile access in the cloud era.

(more available)
Added: October 23, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of various mobile app security methods including per-app VPN, containers, and micro-segmentation.”

(more available)
Added: October 23, 2018
image from Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

If you are looking for insight into the growing world of mobile payments, and the security surrounding those transactions, this paper is for you.

(more available)
Added: October 23, 2018
image from Quarterly Threat Summary Q1 2016

Quarterly Threat Summary Q1 2016

This Quarterly report offers key takeaways from the first Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 23, 2018
image from The CIO's Guide To Mobile Threat Defense

The CIO's Guide To Mobile Threat Defense

This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense.

Added: October 23, 2018
image from The Fraud Beat 2016

The Fraud Beat 2016

This report discusses the reality that everyone is susceptible to fraudulent emails. It discusses why that is the case, and offers some solutions.

(more available)
Added: October 23, 2018
image from The State of Online Privacy 2016

The State of Online Privacy 2016

This is a press release regarding a s study that finds more British Internet users are concerned about data privacy than losing their income.

(more available)
Added: October 23, 2018
image from Threat Advisory: Anato

Threat Advisory: Anato

This is a threat advisory for Anato

Added: October 23, 2018
image from Threat Advisory: Tiscali App

Threat Advisory: Tiscali App

This is a threat advisory for the Tiscali App.

Added: October 23, 2018
image from United Endpoint Management: The Next Step In The Evolution Of Device Management

United Endpoint Management: The Next Step In The Evolution Of Device Management

This paper provides a simple summary of Endpoint Management and why it is necessary and helpful.

Added: October 23, 2018
image from 2017 Security Annual Volume 1

2017 Security Annual Volume 1

This paper was written for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams.

(more available)
Added: October 22, 2018
image from 5G Security Architecture White Paper

5G Security Architecture White Paper

From the report, “We are now seeing the first incarnations of 5G technology. It provides many capabilities that make it a preferred platform for the digitalized world. Solid security is one of the strengths of 4G networks and the same is expected from 5G. This cannot, however, be achieved just by adapting 4G security features to 5G system because the 5G service palette is more than just an extension from that of 4G. Completely new security functionalities and services are needed in addition to enhanced versions of 4G security features.”

(more available)
Added: October 22, 2018
image from Connected Healthcare: The Cybersecurity Threat Is Real And Impending

Connected Healthcare: The Cybersecurity Threat Is Real And Impending

This report discusses why it is important to protect medical device apps “in the wild”.

Added: October 22, 2018
image from Enterprise Mobile Security Pulse Report Q4 2017

Enterprise Mobile Security Pulse Report Q4 2017

The Appthority Enterprise Mobile Security Pulse Report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during our deep app analysis.

(more available)
Added: October 22, 2018
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 16, 2025 00:11 UTC (build 0d9043b)