Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Outage

Below you will find reports with the tag of “Outage”

image from ISP DDoS Protection May Not Cover All Bases

ISP DDoS Protection May Not Cover All Bases

This short article gives a 10 reasons why an ISP’s DDoS Protection may not be able to actually protect an organization.

(more available)
Added: October 20, 2018
image from 2016 Cost of Data Center Outages

2016 Cost of Data Center Outages

Previously published in 2010 and 2013, the purpose of this third study is to continue to analyze the cost behavior of unplanned data center outages. According to our new study, the average cost of a data center outage has steadily increased from $505,502 in 2010 to $740,357 today (or a 38 percent net change).

(more available)
Added: October 19, 2018
image from Cloud Security Defense: In Detail If Not In Depth

Cloud Security Defense: In Detail If Not In Depth

This report discusses the results of a survey conducted in 2017 to determine what information, concerns and security choices organizations are making with the cloud and the security of the cloud.

(more available)
Added: October 19, 2018
image from Global Application & Network Security Report 2017-2018

Global Application & Network Security Report 2017-2018

This report highlights the trends and threats of 2017 as observed by Radware.

Added: October 19, 2018
image from Lloyds City Risk Index 2015-2025

Lloyds City Risk Index 2015-2025

Lloyd’s City Risk Index 2015-2025, shows that trillions of dollars are at risk from manmade and natural disasters – disasters that have occurred in the past and are likely to do so again in the future. The nature of these threats is changing too. Certain extreme weather events linked to climate change are increasing in severity and frequency. Manmade threats, such as cyber attack and market crash, are increasingly significant as companies expand into new markets and territories.

(more available)
Added: October 19, 2018
image from Preparing For NGAV At Scale

Preparing For NGAV At Scale

This Paper is subtitled “Stopping Attacks In Progress Starts With Asking The Right Questions” The paper tries to discuss and reveal the questions that should be asked.

(more available)
Added: October 19, 2018
image from Ransomware Survey Infographic

Ransomware Survey Infographic

To get a more complete sense of the impact of ransomware beyond the headlines and statistics, we surveyed IT professionals who have had to deal with it firsthand.

(more available)
Added: October 19, 2018
image from Verisign DDoS Trends Report Q1 2017

Verisign DDoS Trends Report Q1 2017

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services from Jan. 1, 2017 through March 31, 2017 (Q1 2017). It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q1 2017.

(more available)
Added: October 19, 2018
image from Broadband Over Existing Cable In Hotels: VDSL2 vs Docsis

Broadband Over Existing Cable In Hotels: VDSL2 vs Docsis

This solution brief discusses networking issues in hotels.

Added: October 18, 2018
image from Control Your Cloud: The Pitfalls Of Shared Cloud Strategies

Control Your Cloud: The Pitfalls Of Shared Cloud Strategies

This takes a look at how not all cloud security options are created equal.

Added: October 18, 2018
image from Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

This guide was written as a follow-up to “Monitoring 101.” It seeks to provide further more advanced information about Monitoring, the challenges and the successes that can be had.

(more available)
Added: October 18, 2018
image from State of the Internet Q4 2015 report

State of the Internet Q4 2015 report

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2015, covering Internet connection speeds and broadband adoption metrics as well as trends seen in this data over time. In addition, the report includes insight into the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter, and observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks.

(more available)
Added: October 18, 2018
image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017.

(more available)
Added: October 18, 2018
image from Annual Incident Reports 2015

Annual Incident Reports 2015

This report is an analaysis of Article 13a annual incident reports in the telecomm sector of the EU.

Added: October 17, 2018
image from Crypto-Ransomware Survey Results 2016

Crypto-Ransomware Survey Results 2016

Researchscape surveyed 275 IT experts from January 15 to January 30, 2016. This report is based on the findings of that survey.

(more available)
Added: October 17, 2018
image from Office 365 Exchange Online: Research Report December 2016

Office 365 Exchange Online: Research Report December 2016

This ebook provides a report on the results of a survey that was conducted to discover information on 4 issues related to Office 365.

(more available)
Added: October 17, 2018
image from State of the Internet Q3 2015 report

State of the Internet Q3 2015 report

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2015, covering Internet connection speeds and broadband adoption metrics as well as trends seen in this data over time. In addition, the report includes insight into the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter, and observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks.

(more available)
Added: October 17, 2018
image from The National Computer Security Survey (NCSS)

The National Computer Security Survey (NCSS)

The Bureau of Justice Statistics (BJS) within the U.S. Department of Justice (DOJ), along with the U.S. Department of Homeland Security (DHS), conducted the National Computer Security Survey (NCSS), a nationally representative sample of businesses across 36 industry sectors. This report will be of interest to researchers and analysts who are interested in under- standing the methodology underlying the NCSS, including questionnaire design, survey field- ing, sampling, and weighting methodologies for this large-scale survey. The report will also be informative for scholars who are interested in analyzing the NCSS public-use data file.

(more available)
Added: October 17, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

This paper seeks to provide high level and tactical findings that are intended to help you advance the progress of your own DevOps Journey. Some key findings in this report are; the beneficial effects of DevOps go beyond financial results, automation is a key differentiator for organizations, and they delve deep into how an application’s architecture can affect an organization’s ability to develop and deliver software.

(more available)
Added: October 16, 2018
image from A Journey Through Hybrid IT And The Cloud

A Journey Through Hybrid IT And The Cloud

This e-Book seeks to provide the reader with some information and insight into the challenges and struggles that come with switching data to a cloud based system.

(more available)
Added: October 16, 2018
image from Benefits And Costs Of Alternate Cyber Futures

Benefits And Costs Of Alternate Cyber Futures

This report seeks to answer the following questions, In 2030, will the Internet and related information and communications technologies (ICT) continue to drive global innovation and prosperity? Or, will that bright promise be swamped by an unstable and insecure Internet, so overwhelmed by non-stop attacks that it has become an increasing drag on economic growth?

(more available)
Added: October 16, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 9, 2025 12:08 UTC (build b1d7be4)