Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Media

Below you will find reports with the tag of “Social Media”

image from 2018 Bad Bot Report:The Year Bad Bots Went Mainstream

2018 Bad Bot Report:The Year Bad Bots Went Mainstream

Focussing on Bad Bots, this report offers some updated insights into the current bad bot statistics and situations.

Added: October 19, 2018
image from 9 Realities Of Data Protection In The 21st Century

9 Realities Of Data Protection In The 21st Century

This paper discusses how a portable and persistent data protection model can enable your business.

Added: October 19, 2018
image from Don't Compromise On Identity Because Of GDPR Compliance

Don't Compromise On Identity Because Of GDPR Compliance

This paper offers a helpful checklist for making sure you do not compromise your identity management for the sake of GDPR compliance.

(more available)
Added: October 19, 2018
image from Global Advanced Threat Landscape Survey 2018: Focus On DevOps

Global Advanced Threat Landscape Survey 2018: Focus On DevOps

The CyberArk Advanced Threat Landscape 2018 annual report is the 11th of its kind and will be released in three parts. This is part one, focusing on how privileged account security is incorporated into DevOps processes.

(more available)
Added: October 19, 2018
image from Internet Trends 2016 Code Conference

Internet Trends 2016 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 19, 2018
image from Machine Learning: How To Build A Better Threat Detection Model

Machine Learning: How To Build A Better Threat Detection Model

This is a very good guide to building a good threat detection model for machine learning.

Added: October 19, 2018
image from Mobile Leak Report 2017

Mobile Leak Report 2017

This report calls itself “The Panama Papers” of mobile leak reporting.

Added: October 19, 2018
image from Quarterly Threat Report Q2 2017

Quarterly Threat Report Q2 2017

This Quarterly report offers key takeaways from the second Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 19, 2018
image from The Weaponization Of Information: The Need For Cognitive Security

The Weaponization Of Information: The Need For Cognitive Security

This paper presents the Testimony of Rand Waltzman presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017.

(more available)
Added: October 19, 2018
image from Trends for 2015: Targeting the Corporate World

Trends for 2015: Targeting the Corporate World

The “Trends For 2015 – Targeting the Corporate World” report by the ESET LATAM Research Lab invites you to review some of the most significant cases that affected computer security in 2014, and to consider and present the challenges and threats expected for 2015. This report will try to address the different types of threats and security incidents we have witnessed during the year classified by catego- ry in order to answer the following questions: what will we find during 2015 in terms of IT security? And how, therefore, can companies and individual users prepare themselves to get through next year in safe- ty?

(more available)
Added: October 19, 2018
image from Untangling CIPA

Untangling CIPA

This paper takes a look at the Children’s Internet Protection Act.

Added: October 19, 2018
image from 2017 Social Poll Series Report

2017 Social Poll Series Report

This is a report based on a survey that seeks to understand how companies look at cloud security.

Added: October 18, 2018
image from Build Vs. Buy: Evaluating Identity Management

Build Vs. Buy: Evaluating Identity Management

Every corporation struggles with the decision to Build or Buy an identity management platform. This report seeks to offer advice to aid in that decision.

(more available)
Added: October 18, 2018
image from Business Risk Intelligence Decision Report: 2018 Mid Year Update

Business Risk Intelligence Decision Report: 2018 Mid Year Update

This report provides insight into several of the business risk factors facing organizations in 2018. It specifically reviews events from all around the globe.

(more available)
Added: October 18, 2018
image from Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

The article uses the world’s 1,000 largest companies as a sample to help us better understand the extent to which organizations are effected by cyber threats and how threat actors my be looking to exploit these credentials.

(more available)
Added: October 18, 2018
image from Into The Web Of Profit

Into The Web Of Profit

This book provides excellent research and an in-depth study of cybercrime criminals and money.

Added: October 18, 2018
image from Mobile Data Report

Mobile Data Report

This report looks at data from the mobile estates of global asset management and investment firms; providing analysis, benchmarking and best practice guidance on keeping mobile devices secure and managing data consumption.

(more available)
Added: October 18, 2018
image from Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

This guide was written as a follow-up to “Monitoring 101.” It seeks to provide further more advanced information about Monitoring, the challenges and the successes that can be had.

(more available)
Added: October 18, 2018
image from Personalisation Opportunities In Retail Stores Enhancing Customer Experience Through Location-based Analytics

Personalisation Opportunities In Retail Stores Enhancing Customer Experience Through Location-based Analytics

This report takes a look at the future of the retail industry and how an organizations network can assist with customer experience.

(more available)
Added: October 18, 2018
image from Quarterly Threat Report Q1 2018

Quarterly Threat Report Q1 2018

This Quarterly report offers key takeaways from the first Quarter of 2018. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 18, 2018
image from State of the Internet Q4 2015 report

State of the Internet Q4 2015 report

This quarter’s report includes data gathered from across the Akamai Intelligent Platform during the third quarter of 2015, covering Internet connection speeds and broadband adoption metrics as well as trends seen in this data over time. In addition, the report includes insight into the state of IPv4 exhaustion and IPv6 adoption, Internet disruptions that occurred during the quarter, and observations from Akamai partner Ericsson regarding data and voice traffic growth on mobile networks.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 20:08 UTC (build b1d7be4)