Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Network Intrusion

Below you will find reports with the tag of “Network Intrusion”

image from Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

From the report, “The Appthority Mobile Threat Team analyzed iOS apps in enterprise environments and found over 24,000 unique apps that access various types of user data, such as the calendar, bluetooth and photos, for advertising. These twenty-four thousand apps are just those that are up front with the user about requesting permission to access data for advertising purposes. Over 70% of enterprise environments contain these apps.”

(more available)
Added: October 19, 2018
image from Network Detection: What Is It Really?

Network Detection: What Is It Really?

This report seeks to help provide important information to clarify what cybersecurity organizations are truly offering.

Added: October 19, 2018
image from Security Strategies To Prepare For 5G & IoT

Security Strategies To Prepare For 5G & IoT

In the third quarter of 2017, Heavy Reading, in conjunction with A10 Networks, undertook the creation and execution of a global survey designed to assess cloud, premises, and hybrid network security concerns and evaluate CSPs’ strategies to mitigate the risks of a threat curve on an upward trajectory. The key findings from the survey are documented in this white paper.

(more available)
Added: October 19, 2018
image from Transformational ‘smart cities’: cyber security and resilience

Transformational ‘smart cities’: cyber security and resilience

This report will explore the requirements and challenges of creating a secure, reliable and resilient smart city. It will consider how administrations and the overall city ecosystems will need to provide innovative, resilient ‘smart’ solutions that leverage digital information while protecting against malicious violations, unintentional damage and natural disasters.

(more available)
Added: October 19, 2018
image from Getting To Yes With China In Cyberspace

Getting To Yes With China In Cyberspace

This report is a response to the absence of a formal dialogue and explores U.S. policy options for managing relations with China over this critical policy area. It looks at two basic questions: Can the United States and China return to meaningful formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement, and what might be exchanged for what?

(more available)
Added: October 18, 2018
image from 2016 Cyber Weapons Report

2016 Cyber Weapons Report

A Bulleton recapping headlines and stores in the Global Insurance and Regulatory industry.

Added: October 17, 2018
image from Assessing Russian Activities and Intentions in Recent US Elections

Assessing Russian Activities and Intentions in Recent US Elections

This is a declassified version of a highly classified assessment that has been provided to the President and to recipients approved by the President.

(more available)
Added: October 17, 2018
image from OWASP Top 10 2017 A Flash Card Guide

OWASP Top 10 2017 A Flash Card Guide

This is a fun little infographic that provides information on the top threats of 2017.

Added: October 17, 2018
image from Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

This small report gives a analysis of DDoS attacks and how they are launched and deployed.

Added: October 17, 2018
image from Balancing Security and Accessibility with Compliance in the Healthcare Sector

Balancing Security and Accessibility with Compliance in the Healthcare Sector

This white paper presents some interesting information related to the cybersecurity issues that can occur in the healthcare sector.

Added: October 16, 2018
image from Damage Control: The Cost of Security Breaches

Damage Control: The Cost of Security Breaches

From the report, “Although real damages can be very different from our average estimation, in this report we’ve made a unique attempt to connect potential risks and real consequences of a security breach, defined in dollars, not gigabytes of data and hours of downtime.”

(more available)
Added: October 16, 2018
image from Hacking Back Without Cracking Up

Hacking Back Without Cracking Up

From the paper, “This paper aims, in the first place, to put a concrete proposal on the table. It is not a panacea; it is a plausible way forward. We will start by explaining our proposal in detail and the problems we believe it would solve. We then discuss the proposal’s strategic rationale at a higher level, how it compares to various past and current practices, and why concerns about the dangers are considerably exaggerated. We conclude by considering the specific legal changes the proposal would require.”

(more available)
Added: October 16, 2018
image from HIPAA & The Enterprise Network

HIPAA & The Enterprise Network

This whitepaper will explore HIPAA requirements and how comprehensive network security automation and orchestration will control endpoints, provide total visibility of all network access devices and automate threat response to help ensure compliance.

(more available)
Added: October 16, 2018
image from Quarterly Threat Report:Fourth Quarter 2017

Quarterly Threat Report:Fourth Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they wrap up the cyber events from the year 2017 and lay out some thoughts on what is ahead in 2018.

(more available)
Added: October 16, 2018
image from The Cyber Readiness of Canadian Organizations

The Cyber Readiness of Canadian Organizations

The purpose of this research is to study how Canadian organizations are responding to cyber security threats and the need to invest in enabling security technologies.

(more available)
Added: October 16, 2018
image from The Update Framework Security Assessment

The Update Framework Security Assessment

During the summer of 2017, a study was done on the security issues related to the TUF framework.

Added: October 16, 2018
image from Voice Of The Analyst: An Inside Perspective On Security Operations

Voice Of The Analyst: An Inside Perspective On Security Operations

This report offers the results of a survey that sought to understand the true nature and quality of a SECOP position.

(more available)
Added: October 16, 2018
image from 2017 Global Security Report

2017 Global Security Report

This annual report takes a look at the security events of 2017 and projects what is to come in 2018.

(more available)
Added: October 15, 2018
image from 2017 Internet Crime Report

2017 Internet Crime Report

The 2017 Internet Crime Report emphasizes the IC3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), Ransomware, Tech Support Fraud, and Extortion. The report also highlights the Elder Justice Initiative promoting justice for the nation’s seniors. In 2017, IC3 received a total of 301,580 complaints with reported losses exceeding $1.4 Billion.

(more available)
Added: October 15, 2018
image from Achieving A Competitive Advantage Through Application Security

Achieving A Competitive Advantage Through Application Security

This paper provides 5 key takeaways from a survey of IT professionals and executives who make software purchasing decisions for their organization.

(more available)
Added: October 15, 2018
image from Automation: The Future Of Network Visibility

Automation: The Future Of Network Visibility

This whitepaper provides some insights to consider for automating your SIEM, NMS, packet capture device, and other tool deployments.

Added: October 15, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)