Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile Device

Below you will find reports with the tag of “Mobile Device”

image from It's Time To Breakup With Your Old-School Archive

It's Time To Breakup With Your Old-School Archive

This ebook takes a look at cloud archiving, and why it is a better choice than older more traditional methods.

(more available)
Added: October 16, 2018
image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management.

(more available)
Added: October 16, 2018
image from Mobile Security Index 2018 Infographic

Mobile Security Index 2018 Infographic

This infographic is based on the report of the same name.

Added: October 16, 2018
image from The Executive Cyber Security Playbook

The Executive Cyber Security Playbook

In this ebook, FireEye explains why senior executives must be more proactive about cyber security — before, during and after an event — and how they can help create and maintain a strong security posture.

(more available)
Added: October 16, 2018
image from The Human Point: An Intersection Of Behaviors, Intent, & Critical Business Data

The Human Point: An Intersection Of Behaviors, Intent, & Critical Business Data

Forcepoint conducted a study of 1,252 cybersecurity professionals worldwide to better understand the state of cybersecurity and how organizations might view a forward-focused strategy, one that moves beyond the current state of chasing infrastructure remediation. The following is an extensive rendering of the data culled, which provides a new perspective on how cybersecurity should be tackled in the future.

(more available)
Added: October 16, 2018
image from Trusted Access Report 2017

Trusted Access Report 2017

This paper discusses the evolution of enterprise security.

Added: October 16, 2018
image from 2015 Information security breaches survey

2015 Information security breaches survey

A report from the government of the United Kingdom detailing the findings of a survey regarding security breaches in 2015.

(more available)
Added: October 15, 2018
image from 2017 Call Center Fraud Report

2017 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 15, 2018
image from 2017 Global IP Reputation Analysis Report

2017 Global IP Reputation Analysis Report

This report provides a monthly snapshot of analysis and trends of IP Reputation globally.

Added: October 15, 2018
image from Consumer Security Risks Survey 2016

Consumer Security Risks Survey 2016

This report discusses four main findings; 1) Consumers are concerned about online threats to the people and things that matter most, 2) The dangers online can have severe consequences for people’s data, 3) Children are also exposed to online threats, 4) People should be more cyber savvy - and protect what matters most - when they are online.

(more available)
Added: October 15, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). This paper both references existing research and expands upon it in later sections.

(more available)
Added: October 15, 2018
image from Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

What is the balance of economic benefits and costs conferred upon societies by cyber technologies, also designated here as information and communication technologies (ICT)? And how might that balance change in coming years? This report, prepared as a quantitative foundation for work sponsored by the Zurich Insurance Group, addresses these questions by assessing the current pattern of benefits and costs in countries and globally, mapping their apparent trajectory in recent years, and exploring their possible futures through 2030.

(more available)
Added: October 15, 2018
image from General Data Protection Regulation: The Mobile Implications

General Data Protection Regulation: The Mobile Implications

This paper is designed to help businesses manage their mobile data risks in relation to GDPR, which will affect almost every global organisation.

(more available)
Added: October 15, 2018
image from Guerilla Ad Clicker Targets Android Users

Guerilla Ad Clicker Targets Android Users

This report takes a look at a threat that specifically attacks Android users.

Added: October 15, 2018
image from Just in Time Research: Data Breaches in Higher Education

Just in Time Research: Data Breaches in Higher Education

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this review will be used to inform EDUCAUSE research, programs, products, and services.

(more available)
Added: October 15, 2018
image from Mobile Banking Applications: Security Challenges For Banks

Mobile Banking Applications: Security Challenges For Banks

Accenture and NowSecure, Inc. analyzed the mobile banking app threat landscape based on industry research, customer-facing mobile banking app vulnerability assessments performed by NowSecure, and Accenture’s industry knowledge and experience working with banking institutions. They collaborated to create a report that was designed to provide an understanding of the current- state security environment for customer- facing mobile banking apps, as well as answer some key questions about the state of mobile banking app security.

(more available)
Added: October 15, 2018
image from Mobile Security Index 2018

Mobile Security Index 2018

This paper discusses what organizations fear and what security measures they are taking to mitigate risks. To find out, they commissioned independent research, surveying more than 600 mobility professionals. The results were eye-opening.

(more available)
Added: October 15, 2018
image from Moving Beyond The Password: Consumers' Views On Authentication

Moving Beyond The Password: Consumers' Views On Authentication

In this research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S. consumers who use online and/or mobile banking in January 2017 to better understand their attitudes toward and understanding of various authentication mechanisms.

(more available)
Added: October 15, 2018
image from Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

System designers have long struggled with the challenge of determining how to control when untrusted applica- tions may perform operations using privacy-sensitive sen- sors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors. Proposed research methods enable systems to infer the op- erations associated with user input events, but malicious applications may still trick users into allowing unexpected, stealthy operations. To prevent users from being tricked, we propose to bind applications’ operation requests to the associated user input events and how they were ob- tained explicitly, enabling users to authorize operations on privacy-sensitive sensors unambiguously and reuse such authorizations.

(more available)
Added: October 15, 2018
image from Privilege Security For The New Perimeter

Privilege Security For The New Perimeter

Security in an era of next-generation technologies, expanding digital footprints, and widely dispersed user bases requires a comprehensive hybrid approach, delivered through privileged access management (PAM).

(more available)
Added: October 15, 2018
image from Quarterly Threat Report:Third Quarter 2017

Quarterly Threat Report:Third Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they sought to make a less chaotic picture of the events of the 3rd quarter of 2017.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 04:11 UTC (build 0d9043b)