Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile Device

Below you will find reports with the tag of “Mobile Device”

image from ENISA Threat Taxonomy: A tool for structuring threat information.pdf

ENISA Threat Taxonomy: A tool for structuring threat information.pdf

The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015. The consolidated threat taxonomy is an initial version: in 2016, ENISA plans to update and expand it with additional details, such as definitions of the various threats mentioned.

(more available)
Added: October 21, 2018
image from Enterprise Mobile Security Pulse Report Q3 2017

Enterprise Mobile Security Pulse Report Q3 2017

This report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during application analysis.

(more available)
Added: October 21, 2018
image from Future Vision For Secure Mobility

Future Vision For Secure Mobility

From The Report, “This article is fifth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides a future vision for how mobile security is likely to evolve in the context of enterprise evolution.”

(more available)
Added: October 21, 2018
image from Mobile Threat Intelligence Report First Half 2018

Mobile Threat Intelligence Report First Half 2018

This report provides information regarding events from the first half of 2018.

Added: October 21, 2018
image from Mobile Wi-Fi Security Report

Mobile Wi-Fi Security Report

This report is designed to inform you of the many dangers of Wi-Fi, and how to deal with them.

Added: October 21, 2018
image from New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

In August 2017, Cyber adAPT partnered with research and smart data firm Aberdeen Group to conduct a threat detection survey. The results provide critical data and the ability to analyze a variety of detection technology questions and scenarios.

(more available)
Added: October 21, 2018
image from Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

This is a threat advisory for Thomas Cook Ltd. Mobile Apps & Website

Added: October 21, 2018
image from What iOS11 Means To The Enterprise

What iOS11 Means To The Enterprise

This report offers insight into iOS11 and how Apple technology is providing useful resources to enterprises that are moving away from PC’s.

(more available)
Added: October 21, 2018
image from 21st CEO Survey: The Anxious Optimist In The Corner Office

21st CEO Survey: The Anxious Optimist In The Corner Office

This survey report offers insights into the thoughts and experiences of CEO’s including what threats keep them up at night.

(more available)
Added: October 20, 2018
image from A Unified Approach To Rugged Device Management

A Unified Approach To Rugged Device Management

This whitepaper will delve into the evolution of rugged devices, the management challenges associated with such deployments, and how a UEM solution can address these challenges to enable a fully connected environment that is both manageable and secure.

(more available)
Added: October 20, 2018
image from AndroRATIntern: A Japanese Mobile Threat With Global Implications For Mobile Data Security

AndroRATIntern: A Japanese Mobile Threat With Global Implications For Mobile Data Security

This report provides an exclusive look at a very particular Trojan that has appeared out of Japan.

Added: October 20, 2018
image from Building Technology Infrastructure For Learning

Building Technology Infrastructure For Learning

This report from the Department Of Education provides insight into good technoglogy infrastructure for educational purposes.

Added: October 20, 2018
image from DDoS Trends Report Q4 2016

DDoS Trends Report Q4 2016

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign. It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q4 2016.

(more available)
Added: October 20, 2018
image from Detection Survey Infographic

Detection Survey Infographic

This infographic offers a summary of survey points that sought to answer what is causing the spike in detection investment.

(more available)
Added: October 20, 2018
image from eCommerce Threats Of 2018

eCommerce Threats Of 2018

This report discusses the malicious Bots in 2018 and how they can impact the eCommerce sector.

Added: October 20, 2018
image from Email Archiving: It's Time For An Update

Email Archiving: It's Time For An Update

This report offers a guide to understanding the importance of email archiving.

Added: October 20, 2018
image from Internet Trends 2017 Code Conference

Internet Trends 2017 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 20, 2018
image from Mobile Phishing Report 2018

Mobile Phishing Report 2018

This whitepaper looks at the evolution of mobile phishing - examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.

(more available)
Added: October 20, 2018
image from Mobile Security Report: 2017 Spotlight Report

Mobile Security Report: 2017 Spotlight Report

This mobile security report provides insights into the events of 2017.

Added: October 20, 2018
image from Ransomware: Many Victims Few Solutions Infographic

Ransomware: Many Victims Few Solutions Infographic

This infographic takes a look at Ransomware and provides a brief overview of discusses some solutions.

Added: October 20, 2018
image from Secure Mobile Development Best Practices

Secure Mobile Development Best Practices

This guide gives specific recommendations to use during your development process. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your apps more secure.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 16, 2025 00:11 UTC (build 0d9043b)