Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Operating System

Below you will find reports with the tag of “Operating System”

image from Control Your Cloud: The Pitfalls Of Shared Cloud Strategies

Control Your Cloud: The Pitfalls Of Shared Cloud Strategies

This takes a look at how not all cloud security options are created equal.

Added: October 18, 2018
image from Cyber Risk Report 2016

Cyber Risk Report 2016

From the report, “In this report we provide a broad view of the 2015 threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.”

(more available)
Added: October 18, 2018
image from Global Threat Report Q4 2017

Global Threat Report Q4 2017

This report takes a look at the mobile threat events for the last quarter of 2017.

Added: October 18, 2018
image from HIPAA Compliant Containers

HIPAA Compliant Containers

This Technical paper discusses the need for Containers. Containers allow deployment of single-purpose virtual compute instances for processing workloads in the cloud regardless of the operating system used. Care must be taken, however, to ensure that your container strategy, deployment methodology, monitoring protocols, and vulnerability management practices are harmonized in a manner that complies with the HIPAA Security Rule, as well as industry recognized security frameworks such as NIST, ISO, CSF and PCI DSS. Read the Paper to understand more about that issue.

(more available)
Added: October 18, 2018
image from Network Attached Security Attacking A Synology NAS

Network Attached Security Attacking A Synology NAS

Network-Attached Storage (NAS) devices are a popular way for people to store and share their photos, videos and documents. Securing these devices is essential as they can contain sensitive information and are often exposed to the Internet. Because Synology is one of the top manufacturers of NAS devices, this paper chose to analyze a Synology DS215j. In doing so it identifies a number of exploitable security flaws. In this paper, they discuss in detail the analysis performed, methodologies used, and vulnerabilities found during the summer of 2015.

(more available)
Added: October 18, 2018
image from Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

This report looks at a remote access Trojan named KONNI that was targeting North Korea.

Added: October 18, 2018
image from State of the Internet Q4 2015 report

State of the Internet Q4 2015 report

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2015, covering Internet connection speeds and broadband adoption metrics as well as trends seen in this data over time. In addition, the report includes insight into the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter, and observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks.

(more available)
Added: October 18, 2018
image from Threat Advisory: Skyscape

Threat Advisory: Skyscape

This is a threat advisory for Skyscape

Added: October 18, 2018
image from 2018 State Of DevOps Report

2018 State Of DevOps Report

The 2018 State of DevOps Report breaks new ground in an understanding of the DevOps evolutionary journey. They have identified the five distinct stages of DevOps evolution, and the critical practices at each stage that help you achieve success and progress to the next phase of your journey.

(more available)
Added: October 17, 2018
image from ASEC Report Volume 86 Q1 2017

ASEC Report Volume 86 Q1 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in the 1st QTR of 2017.

(more available)
Added: October 17, 2018
image from Cyber Threats To The Healthcare And Health Insurance Industries

Cyber Threats To The Healthcare And Health Insurance Industries

Learn about current and impending cyber threats to the healthcare and health insurance industry.

Added: October 17, 2018
image from Enterprise Guide To iOS App Development

Enterprise Guide To iOS App Development

This paper provides a helpful guide to iOS App development for the enterprise.

Added: October 17, 2018
image from Incident Response For Android And iOS

Incident Response For Android And iOS

This book will prepare enterprises and practitioners for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setting up a mobile IR practice all the way through continuous monitoring of mobile devices.

(more available)
Added: October 17, 2018
image from Mcafee Labs Threats Report September 2017

Mcafee Labs Threats Report September 2017

In this quarterly threats report, they highlight three Key Topics: In the lead story, they analyze the recent WannaCry and Petya attacks, the perpetrators’ likely motives, and the business impact. The second Key Topic departs from their usual threat analysis stories. Because threat hunting is becoming increasingly important, in this story they offer detailed advice and recommendations for using certain types of indicators of compromise when hunting for threats. In the final Key Topic, they explore script-based malware—why it is used, how authors obfuscate scripts, how it propagates, and its growth in popularity.

(more available)
Added: October 17, 2018
image from Mobile Data Report

Mobile Data Report

This report pays particular attention to the state of mobile security in law firms.

Added: October 17, 2018
image from Ransomware: A Victims perspective

Ransomware: A Victims perspective

This paper seeks to answer the following questions, “What motivates victims to pay up? How much do they value their data? What role does antivirus protection play in the problem-solving equation?"

(more available)
Added: October 17, 2018
image from Security Response: The Evolution of Ransomware

Security Response: The Evolution of Ransomware

This report takes a look at how the ransomware types work, not just from a technological point of view but also from a psychological viewpoint. They also look at how these threats evolved, what factors are at play to make ransomware the major problem that it is today, and where ransomware is likely to surface next.

(more available)
Added: October 17, 2018
image from State of the Internet Q3 2015 report

State of the Internet Q3 2015 report

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2015, covering Internet connection speeds and broadband adoption metrics as well as trends seen in this data over time. In addition, the report includes insight into the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter, and observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks.

(more available)
Added: October 17, 2018
image from The Case For Software Security

The Case For Software Security

This E-book discusses the importance of securing software.

Added: October 17, 2018
image from The Evolution Of Network Access Control

The Evolution Of Network Access Control

This whitepaper discusses the growing network security issues caused by IoT, BYOD, and other issues occuring in cyber technology.

Added: October 17, 2018
image from Trusted Access Report 2018

Trusted Access Report 2018

This report takes a closer look at user authentications and how users behave in phishing simulations, as well as shedding light on the security health of users’ devices used to log into enterprise applications.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 12:08 UTC (build b1d7be4)