Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Outage

Below you will find reports with the tag of “Outage”

image from Damage Control: The Cost of Security Breaches

Damage Control: The Cost of Security Breaches

From the report, “Although real damages can be very different from our average estimation, in this report we’ve made a unique attempt to connect potential risks and real consequences of a security breach, defined in dollars, not gigabytes of data and hours of downtime.”

(more available)
Added: October 16, 2018
image from Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

This paper seeks to simplify Cloud security and offers some solutions to the issues that an enterprise might deal with.

(more available)
Added: October 16, 2018
image from Growing Disaster Recovery Needs Change the Role of Data Backup

Growing Disaster Recovery Needs Change the Role of Data Backup

Data protection in the form of backup and recovery remains one of the key tools in a company’s disaster recovery/business continuity toolbox. However, the increasing adoption of cloud-based IT options has also added a new set of challenges for managing and protecting business processes that can extend beyond the datacenter. There’s an increasing need for contingency plans that address the potential loss of mission-critical services, as well as the applications and data itself.

(more available)
Added: October 16, 2018
image from Insiders Guide to Defeating Ransomware

Insiders Guide to Defeating Ransomware

This e-book sounds the alarm about the threat of ransomware for businesses and public sector organizations, equips security professionals with the facts about the risks and consequences of ransomware, and presents an approach to protect enterprise data from ransomware attacks.

(more available)
Added: October 16, 2018
image from Integrated Infrastructure: Cyber Resiliency in Society, Mapping the Consequences of an Interconnected Digital Economy;

Integrated Infrastructure: Cyber Resiliency in Society, Mapping the Consequences of an Interconnected Digital Economy;

A very detailed report that discusses the dangers of cyber threats to infrastructure and large systems that impact all of society.

(more available)
Added: October 16, 2018
image from Mobile Security Index 2018 Infographic

Mobile Security Index 2018 Infographic

This infographic is based on the report of the same name.

Added: October 16, 2018
image from Risk Degrees Of Separation

Risk Degrees Of Separation

This BitSight Insights report, Risk Degrees of Separation: The Impact of Fourth Party Networks on Organizations, focuses on aggregate risk and the issue of single points of failure. Insurance companies tackle this risk by monitoring whether a common set of threats impact their entire portfolio of insureds. However, without visibility into cyber risk aggregation, an insurance company could be jeopardized if there is a breach or any type of network disruption that affects a majority of their insureds.

(more available)
Added: October 16, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

The fifth annual State of DevOps Report confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns.

(more available)
Added: October 15, 2018
image from Always On. Always Up.

Always On. Always Up.

This white paper is geared towards the energy industry and learning about how network security can help maintain cybersecurity protections specifically in that industry.

(more available)
Added: October 15, 2018
image from Annual Worldwide Infrastructure Security Report, Vol 11

Annual Worldwide Infrastructure Security Report, Vol 11

The data within this document is based on the collective experiences, observations and concerns of the global operational security community. Arbor Networks has collected this data through a survey conducted in October 2015.

(more available)
Added: October 15, 2018
image from Automation: The Future Of Network Visibility

Automation: The Future Of Network Visibility

This whitepaper provides some insights to consider for automating your SIEM, NMS, packet capture device, and other tool deployments.

Added: October 15, 2018
image from Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

What is the balance of economic benefits and costs conferred upon societies by cyber technologies, also designated here as information and communication technologies (ICT)? And how might that balance change in coming years? This report, prepared as a quantitative foundation for work sponsored by the Zurich Insurance Group, addresses these questions by assessing the current pattern of benefits and costs in countries and globally, mapping their apparent trajectory in recent years, and exploring their possible futures through 2030.

(more available)
Added: October 15, 2018
image from Mobile Security Index 2018

Mobile Security Index 2018

This paper discusses what organizations fear and what security measures they are taking to mitigate risks. To find out, they commissioned independent research, surveying more than 600 mobility professionals. The results were eye-opening.

(more available)
Added: October 15, 2018
image from How To Keep Cyberattacks In Check

How To Keep Cyberattacks In Check

This small report offers some simple guidelines that can help your organization keep cyberattacks at bay.

Added: October 14, 2018
image from Implications Of Using Privileged Access Management To Enable Next Generation Technology

Implications Of Using Privileged Access Management To Enable Next Generation Technology

To better understand how security issues, such as privileged access management (PAM), affect the adoption of next-generation technologies, BeyondTrust – the leader in PAM – commissioned the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology survey. The results are a wake-up call for anyone looking to leverage these next-generation technologies.

(more available)
Added: October 14, 2018
image from Intent-Based Networking And Extending The Enterprise

Intent-Based Networking And Extending The Enterprise

Cisco provides a brief report that discusses intent based networking and the enterprise.

Added: October 14, 2018
image from The State Of Endpoint Security Today

The State Of Endpoint Security Today

This paper delivers insights into the prevalent cybersecurity issues facing organizations today: from ransomware to exploits and machine learning, it shares the experiences and future plans of IT managers across the globe. It’s an illuminating read, providing insight into where the field stands on these issues.

(more available)
Added: October 14, 2018
image from Top Ten DNS Attacks

Top Ten DNS Attacks

This report takes a look at the top ten DNS attacks.

Added: October 14, 2018
image from Conversational Office 365 Risk Mitigation: A Conversational Geek Book

Conversational Office 365 Risk Mitigation: A Conversational Geek Book

This ebook provides a casual approach to cloud mitigation. It offers information in a conversational method, allowing for the reader to be able to more effectively communicate with those in his organization who need the information.

(more available)
Added: October 13, 2018
image from Cyber Attacks: Power Failure Implications

Cyber Attacks: Power Failure Implications

A paper discussing the impact of a cyber attack on the power grid.

Added: October 13, 2018
image from Game Plan for Closing the SecOPS Gap

Game Plan for Closing the SecOPS Gap

Forbes created a new survey. And, from that survey, a common theme emerged from the survey and the one-on-one interviews: today’s enterprises need a modern game plan that uses technology, people and processes to close the SecOps gap.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 9, 2025 16:08 UTC (build b1d7be4)