Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Media

Below you will find reports with the tag of “Social Media”

image from Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience.

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Report

Cybersecurity Insights Report

This research explores the personal impact of online crime. “Our hope is that the findings will move people from general awareness online of the threats to a clearer sense of what’s at risk and why they should care—and take action.”

(more available)
Added: October 13, 2018
image from Office 365 Survey: An Infographic

Office 365 Survey: An Infographic

This infographic reveals the details of a survey related to the security related issues in organizations that use Office 365,

(more available)
Added: October 13, 2018
image from Threat Summary And Year In Review Q4 2016

Threat Summary And Year In Review Q4 2016

This Quarterly report offers key takeaways from the fourth Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 13, 2018
image from Tracking Down The [A]pache Fishing Kit

Tracking Down The [A]pache Fishing Kit

In our latest research into the dark and dangerous world of phishing kits, Check Point Research and CyberInt have joined forces to show you how one of the most advanced phishing kits, the [A]pache Next Generation Advanced Phishing Kit, is currently being promoted and used on the Dark Net.

(more available)
Added: October 13, 2018
image from 2016 Norton Cyber Security Insights Report

2016 Norton Cyber Security Insights Report

This report finds that victims of cybercrime within the past year often continued their unsafe behavior. This report details and discusses this issue.

(more available)
Added: October 12, 2018
image from 2017 Security Predictions

2017 Security Predictions

This report seeks to prove that the world emerging in 2017 will challenge cybersecurity professionals like never before.

Added: October 12, 2018
image from Cyber Extortion Risk Report

Cyber Extortion Risk Report

This report looks at the costs, and the growth, of cybercrimes, based on data from five countries. It also examines the types and numbers of cyber crimes and their impacts. It also offers predictions for the future of cyber crimes.

(more available)
Added: October 12, 2018
image from Cyber Power Potential Of The Army's Reserve Component

Cyber Power Potential Of The Army's Reserve Component

This report documents research conducted as part of a study entitled “Managing and Developing Reserve Component Capabilities in Sup- port of the Army’s Cyber Force.” The primary purpose of the study was to conduct initial research on how to train, manage, and develop the Army’s cyber force, with a specific focus on the Army National Guard and the U.S. Army Reserve.

(more available)
Added: October 12, 2018
image from Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

This Case Study looks at an example of how the app Pokemon Go, caused the compromise of sensitive corporate data.

(more available)
Added: October 12, 2018
image from Producing Your Network Security Policy

Producing Your Network Security Policy

This paper is designed to help you put together your organization’s network security policy.

Added: October 12, 2018
image from State of the Internet Security Report Q1 2018

State of the Internet Security Report Q1 2018

This Quaterly report continues Akamai’s breakdown of the internet security events that occurred in the first Quarter of 2018.

Added: October 12, 2018
image from The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

This paper studies and explores the techniques and methods used by actors to spread fake news and manipulate public opinion to serve various motives ranging from personal and financial to political. It also discusses the three legs of the fake news triangle: the services that enable them, their appearance on social media sites, and the motivations behind these activities.

(more available)
Added: October 12, 2018
image from The Human Factor 2018: People Centered Threats Drive The Landscape

The Human Factor 2018: People Centered Threats Drive The Landscape

This report offers insight into the human factor and how cybercriminals have continued to recognize that the greatest vulnerability of an organization is the humans that run it.

(more available)
Added: October 12, 2018
image from Threat Intelligence Executive Report 2017: Volume 3

Threat Intelligence Executive Report 2017: Volume 3

This Threat Report takes a look at some of the events of spring 2017. Specifically, it looks at criminal campaigns that leveraged exploits exposed by the Shadow Brokers, threat groups that used social media profiles, a threat group that attacked supply chains of large corporations, quickly evicting threat actors from a compromised environment.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 16:08 UTC (build b1d7be4)