Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Peripherals

Below you will find reports with the tag of “Peripherals”

image from Global Small Business Multi-Factor Authentication (MFA) Study

Global Small Business Multi-Factor Authentication (MFA) Study

In May, CRI launched a global study to discover the level of MFA awareness and implementation among 1403 small and medium sized business surveyed across eight countries. (more available)
Added: July 5, 2022
image from Cisco Global Hybrid Work Study 2022

Cisco Global Hybrid Work Study 2022

This research aimed to uncover insights into how employees have fared over the past two years, where hybrid and remote working has been commonplace. (more available)
Added: May 31, 2022
image from Internt of Tip-offs (IoT)

Internt of Tip-offs (IoT)

An analysis on the indicators to be derived from detecting Internet of Things (IoT) in organization’s public internet facing profiles.
Added: January 26, 2021
image from 2020 Unit 42 IoT Threat Report

2020 Unit 42 IoT Threat Report

This annual report looks at changes in internet of things security.
Added: November 1, 2020
image from Banking on Security

Banking on Security

In this report, we will address the aforementioned questions using data that Forescout Technologies has carefully gathered, tested and validated from all forms of device networks and the applications they support. (more available)
Added: May 8, 2020
image from Cisco 2018 Privacy Maturity Benchmark Study

Cisco 2018 Privacy Maturity Benchmark Study

The Cisco 2018 Privacy Maturity Benchmark Study was created in conjunction with Cisco’s Annual Cybersecurity Benchmark Study, a double-blind survey completed by more than 3600 security professional in 25 countries and across all major industries. (more available)
Added: February 12, 2019
image from Email and Internet Voting: The Overlooked Threat To Election Security

Email and Internet Voting: The Overlooked Threat To Election Security

This report reviews the research that has been conducted by the federal government concluding that secure online voting is not yet feasible. (more available)
Added: November 20, 2018
image from 2018 Eye On Privacy Report

2018 Eye On Privacy Report

This paper tries to answer the question, “What does the general public know about data privacy?”
Added: October 26, 2018
image from The CIO's Triple Threat Guide To Care Team Communication

The CIO's Triple Threat Guide To Care Team Communication

This report seeks to discuss the issues related to archaic communication devices in the hospital setting. It hopes to provide assistance for the security issues related to updating communication systems. (more available)
Added: October 25, 2018
image from The 5 Most Vulnerable Patient Handoff Scenarios

The 5 Most Vulnerable Patient Handoff Scenarios

Hospital communications have a major breakdown in patient handoff due to archaic communication devices. This report seeks to help solve that problem, while also discussing the security issues related to the new communication devices. (more available)
Added: October 24, 2018
image from Next-Gen Endpoint Risks And Protections: A SANS Survey

Next-Gen Endpoint Risks And Protections: A SANS Survey

This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. (more available)
Added: October 23, 2018
image from An Analysis Of Exposed IoT Technologies in China

An Analysis Of Exposed IoT Technologies in China

From the paper, “In terms of the technical roadmap, and considering the great differences between China and international IoT systems and products, this paper mainly analyzes IoT assets in China and describes their exposure. (more available)
Added: October 22, 2018
image from A Unified Approach To Rugged Device Management

A Unified Approach To Rugged Device Management

This whitepaper will delve into the evolution of rugged devices, the management challenges associated with such deployments, and how a UEM solution can address these challenges to enable a fully connected environment that is both manageable and secure. (more available)
Added: October 20, 2018
image from DDoS Trends Report Q4 2016

DDoS Trends Report Q4 2016

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign. (more available)
Added: October 20, 2018
image from German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

German Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In German Cities

This paper takes a look at the cities of Germany, and the cyber threats that occurred there.
Added: October 20, 2018
image from The Art Of Organizing And Simplifying IT Support

The Art Of Organizing And Simplifying IT Support

Learn easy and effective ways for IT pros to manage help desk tickets and simplify the job of supporting end-users.
Added: October 20, 2018
image from Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

This paper takes a look at the cities of the west, and the cyber threats that occurred there.
Added: October 20, 2018
image from French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

This paper takes a look at the cities of France, and the cyber threats that occurred there.
Added: October 19, 2018
image from US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

This paper takes a look at the cities of the US, and the cyber threats that occurred there.
Added: October 19, 2018
image from The Internet Of Things Isn't Coming, It's Here

The Internet Of Things Isn't Coming, It's Here

This report discusses the results of a survey conducted in 2016 that asked respondents what makes something a “thing” instead of a “computer. (more available)
Added: October 18, 2018
image from UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

This paper takes a look at the cities of the United Kingdom, and the cyber threats that occurred there.
Added: October 18, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 16:09 UTC (build 051771c)