Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile Device

Below you will find reports with the tag of “Mobile Device”

image from GDPR An Action Plan For Cloud Readiness

GDPR An Action Plan For Cloud Readiness

This E-Book discusses ways to become GDPR Compliant.

Added: October 22, 2018
image from Healthcare Apps In The BYOD World

Healthcare Apps In The BYOD World

This white paper reviews the current state of healthcare apps and device-centric mobile application management, then offers an improved, app-centric approach to mobile security.

(more available)
Added: October 22, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration.

(more available)
Added: October 22, 2018
image from Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology.

(more available)
Added: October 22, 2018
image from Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

This report offers insight into the cyber events of 2015 and makes predictions for 2016 - 2019.

Added: October 22, 2018
image from Mobile Threat Report Q3 2017

Mobile Threat Report Q3 2017

This report provides insights into the security events in mobile threats from the 3rd quarter of 2017

Added: October 22, 2018
image from Multi-Factor Authentication For Dummies

Multi-Factor Authentication For Dummies

This e-book provides a helpful and simple explanation of Multi-Factor Authentication.

Added: October 22, 2018
image from The Current State Of Mobile Malware

The Current State Of Mobile Malware

This report will take you through the most common malware infection vectors, the different types of mobile malware currently plaguing organizations, and how to take the appropriate steps to protect your mobile estate.

(more available)
Added: October 22, 2018
image from The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

IBM Resilient and Ponemon Institute are pleased to release the findings of the study on the importance of cyber resilience for a strong security posture. We surveyed more than 413 IT and IT security professionals in the UK1, Only 25 percent of respondents say their organisation has a high level of cyber resilience. According to the findings, 71 percent of respondents believe their organisation is not prepared to recover from cyber attacks.

(more available)
Added: October 22, 2018
image from Three-Part Guide To Developing A BYOD Strategy

Three-Part Guide To Developing A BYOD Strategy

This paper is subtitled “An IT Architect’s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy”

Added: October 22, 2018
image from 2017 Cloud Security Report

2017 Cloud Security Report

This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others.

(more available)
Added: October 21, 2018
image from 2017 Security Annual Volume 2 - Luminary Interviews

2017 Security Annual Volume 2 - Luminary Interviews

This paper provides interviews with a variety of well known individuals in the cyber security industry.

Added: October 21, 2018
image from 2018 CyberThreat Defense Report

2018 CyberThreat Defense Report

This report advertises itself as a “vendor-agnostic” report. Now in its fifth year, this report has become a staple among IT security leaders and practitioners. They stick to the usual suspects in cyber threats, but also outline some new areas related to Cloud investment, app containers, reliance on mobile devices, and the continuing damage of ransomware.

(more available)
Added: October 21, 2018
image from 2018 Gambling Report

2018 Gambling Report

iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018.

(more available)
Added: October 21, 2018
image from 6 Key Security Requirements for Next Generation Mobile Networks

6 Key Security Requirements for Next Generation Mobile Networks

Mobile network operators (MNOs) are evolving rapidly to deploy transformative networks—4G, 5G, SDN/NFV. Meanwhile they are battling a new and different cyber attack landscape that could compromise BOTH their networks AND their subscribers. Network and subscriber protection are no longer separate problems in this new digital age. Legacy security solutions are inadequate. A new approach to security is needed—with a focus on PREVENTION —not just a reaction to prior known threats. Adopting a prevention posture enables operators to get ahead of the evolving sophistication of attackers.

(more available)
Added: October 21, 2018
image from Accelerate: State Of DevOps Strategies For A New Economy

Accelerate: State Of DevOps Strategies For A New Economy

This report examines the impact that cloud adoption, use of open source software, organizational practices (including outsourcing), and culture all have on software delivery performance.

(more available)
Added: October 21, 2018
image from Application Security Statistics Report 2017

Application Security Statistics Report 2017

This is the 12th annual WhiteHat Security Statistics Report. This year they’ve added some real metrics around DevSecOps. They’ve also added a new SAST section and a mobile security section.

(more available)
Added: October 21, 2018
image from Banking On The Customer To Make Open Banking A Success

Banking On The Customer To Make Open Banking A Success

This paper offers a unqiue look into the complications surrounding that adoption of compliant banking solutions. It seeks to help create simple but compliant solutions that customers accept.

(more available)
Added: October 21, 2018
image from Bring Mac To The Enterprise With A Modern Approach To Management

Bring Mac To The Enterprise With A Modern Approach To Management

This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.

(more available)
Added: October 21, 2018
image from DDoS Threat Report Q3 2017

DDoS Threat Report Q3 2017

This report takes a look at the DDoS threats that occurred in the third quarter of 2017.

Added: October 21, 2018
image from Dealing With The New EU GDPR

Dealing With The New EU GDPR

This paper takes a look at the GDPR and asks if your organization is ready for it.

Added: October 21, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 16, 2025 00:11 UTC (build 0d9043b)