Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile Device

Below you will find reports with the tag of “Mobile Device”

image from Securing Smart Cities:Moving Toward Utopia With Security In Mind

Securing Smart Cities:Moving Toward Utopia With Security In Mind

This paper surveys some of the existing smart technologies currently used in smart cities worldwide. Much like our previous reports on exposed smart devices and the hacking of robots in smart factories, this paper will discuss the risks of using smart technologies in critical sectors and will provide actionable steps to help local governments and urban developers design more secure smart cities.

(more available)
Added: October 26, 2018
image from 2015 Insider Threat Report

2015 Insider Threat Report

Based on survey responses from more than 800 senior business managers and IT professionals in major global markets, the global edition of this report provides present-day insight an opinion not the host of data breach threats that enterprise organizations face on a daily basis.

(more available)
Added: October 25, 2018
image from 2016 State of SMB Cybersecurity

2016 State of SMB Cybersecurity

This report deals with the state of cybersecurity in small and medium-sized businesses. To develop this research, they surveyed 598 individuals in companies with a headcount from less than 100 to 1,000.

(more available)
Added: October 25, 2018
image from 2017 Global Cybersecurity Assurance Report Card

2017 Global Cybersecurity Assurance Report Card

A survey-based report of over 700 individuals. The survey and resulting analysis was perfomed by CyberEdge.

Added: October 25, 2018
image from Cybersecurity Insights Volume 3: The CEO's Guide To Cyberbreach Response

Cybersecurity Insights Volume 3: The CEO's Guide To Cyberbreach Response

This report takes a look at cyberbreach responses and gives guidance as to what might be the best way to respond to a cyberbreach.

(more available)
Added: October 25, 2018
image from National Exposure Index

National Exposure Index

The term “exposure” can mean many things. In the context of this report, they define “exposure” as offering services that either expose potentially sensitive data over cleartext channels or are widely recognized to be unwise to make available on the internet, such as database systems. They looked for the presence of 30 of the most prevalent TCP services across the internet, tallied up the results and performed cross-country comparisons to produce a National Exposure Index, a ranked aggregation of the results of Rapid7’s internet-wide scans of 16 usually cleartext or highly targeted common services, based on the in-country prevalence of those services.

(more available)
Added: October 25, 2018
image from Quarterly Threat Summary Q3 2016

Quarterly Threat Summary Q3 2016

This Quarterly report offers key takeaways from the third Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 25, 2018
image from Secure The App Not The Device

Secure The App Not The Device

This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.”

Added: October 25, 2018
image from Security In A Remote Access World

Security In A Remote Access World

This report looks at six trends that IT execs need to adress now.

Added: October 25, 2018
image from Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

Super Antivirus 2018: A Shady App Many Are Downloading On Google Play

This report provides an inside look at a threat being downloaded on Google Play.

Added: October 25, 2018
image from The CIO's Triple Threat Guide To Care Team Communication

The CIO's Triple Threat Guide To Care Team Communication

This report seeks to discuss the issues related to archaic communication devices in the hospital setting. It hopes to provide assistance for the security issues related to updating communication systems.

(more available)
Added: October 25, 2018
image from Uber: Security Risks Come Along With Your Ride

Uber: Security Risks Come Along With Your Ride

Appthority analyzed the security risks of the Uber app and its integration with other apps in this quarter’s enterprise mobile threat update. What they found may surprise you.

(more available)
Added: October 25, 2018
image from Understanding the Depth of the Global Ransomware Problem

Understanding the Depth of the Global Ransomware Problem

This report presents the results of a survey undertaken in the United States, Canada, Germany and the United Kingdom on ransomware and related issues. The survey was conducted during June 2016 with 165 organizations in the United States, and 125 each in the other nations for a total of 540 surveys completed.

(more available)
Added: October 25, 2018
image from 2017 AWS Cloud Data Protection Survey

2017 AWS Cloud Data Protection Survey

Druva performed an AWS cloud migration survey in November 2017 to get a clearer picture of how organizations are utilizing the AWS service for secondary storage, data protection, and archiving. This survey was conducted across more than 20 industries by IT professionals within multiple roles across the globe. They’ve highlighted our findings in this report.

(more available)
Added: October 24, 2018
image from How Personal Device Data Can Compromise Company Data

How Personal Device Data Can Compromise Company Data

Beginning with the Strava cyber incident, this paper seeks to provide insight into how personal device data can cause a crisis with company data.

(more available)
Added: October 24, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of how mobile app security can be achieved through the technique of code injection.

(more available)
Added: October 24, 2018
image from Securing Information In The Age Of Collaboration

Securing Information In The Age Of Collaboration

This report presents the results of a survey run by ESG and commissioned by Seclore. They analyze information related to data, data security, and collaboration.

(more available)
Added: October 24, 2018
image from Securing The Modern Distributed Enterprise

Securing The Modern Distributed Enterprise

In this report they take a deeper look at the complexities of securing an organization and the role of digital transformation.

(more available)
Added: October 24, 2018
image from Standing Up To Cryptojacking: Best Practices For Fighting Back

Standing Up To Cryptojacking: Best Practices For Fighting Back

In this paper, they explore the differences between legitimate mining and cryptojacking; how cryptojacking works; the costs of cryptojacking to today’s organizations; and practical steps you can take to avoid being a victim of cryptojacking.

(more available)
Added: October 24, 2018
image from The 5 Most Vulnerable Patient Handoff Scenarios

The 5 Most Vulnerable Patient Handoff Scenarios

Hospital communications have a major breakdown in patient handoff due to archaic communication devices. This report seeks to help solve that problem, while also discussing the security issues related to the new communication devices.

(more available)
Added: October 24, 2018
image from The Impact Of Customer Journey Hijacking Q4 2017

The Impact Of Customer Journey Hijacking Q4 2017

This report provides an overview of online journey hijacking based on an analysis of 500 million page views per day from top e-commerce sites across all product categories.

(more available)
Added: October 24, 2018
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 16:13 UTC (build 0d9043b)