Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Media

Below you will find reports with the tag of “Social Media”

image from Cloud Adoption and Risk Report 2016 Q4

Cloud Adoption and Risk Report 2016 Q4

In this report, we detail the types of sensitive data stored in cloud services, how that data is shared within organizations and with third parties, and how risky employee behavior can expose data. We also examine the external threats that use the cloud to exfifiltrate sensitive data pilfered from on-premises systems as well as attacks directed at sensitive data stored in cloud services. Finally, we cover general usage trends including the top most widely used cloud services.

(more available)
Added: October 22, 2018
image from Enterprise Mobile Security Pulse Report Q4 2017

Enterprise Mobile Security Pulse Report Q4 2017

The Appthority Enterprise Mobile Security Pulse Report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during our deep app analysis.

(more available)
Added: October 22, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration.

(more available)
Added: October 22, 2018
image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. Program research is supported by government agencies, foundations, and the private sector.

(more available)
Added: October 22, 2018
image from Quarterly Threat Report Q4 2017

Quarterly Threat Report Q4 2017

This quarterly report offers key takeaways from the fourth quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 22, 2018
image from Social Engineering:How The Human Factor Puts Your Company At Risk

Social Engineering:How The Human Factor Puts Your Company At Risk

Positive Technologies regularly performs assessment of information security awareness among employees at major companies all over the world. This report provides statis- tics and analysis from 10 most instructive testing projects in 2016 and 2017, including examples of successful attacks against employees. These projects are based on various social engineering techniques and generally included emails, phone conversations, and communication via social networks.

(more available)
Added: October 22, 2018
image from Cybersecurity: Labor Market Analysis And Statewide Survey Results

Cybersecurity: Labor Market Analysis And Statewide Survey Results

This report takes a look at the labor market in California, specifically as it relates to Cybersecurity. It offers insight into the growing need for more cybersecurity employees, as well as educational changes that can be made to fill the void.

(more available)
Added: October 21, 2018
image from Enterprise Phishing Resiliency And Defense Report

Enterprise Phishing Resiliency And Defense Report

This annual report takes a specific look at phishing campaigns in 2017.

Added: October 21, 2018
image from How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

This paper presents exclusive research into how chat platforms can be abused and become a cyber security weakness.

Added: October 21, 2018
image from Quarterly Threat Report Q3 2017

Quarterly Threat Report Q3 2017

This Quarterly report offers key takeaways from the third Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 21, 2018
image from Western Europe Security 2016 Predictions

Western Europe Security 2016 Predictions

A thorough infographic detailing predictions for the future of Western Europe Cyber security.

Added: October 21, 2018
image from Combating Web Scraping In Online Businesses

Combating Web Scraping In Online Businesses

This report takes a look at the harmful practice of web scraping.

Added: October 20, 2018
image from Exposing The Enemy Within

Exposing The Enemy Within

This e-Book takes a look at what your DNS can tell you about your security Posture.

Added: October 20, 2018
image from Internet Trends 2017 Code Conference

Internet Trends 2017 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 20, 2018
image from Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

This report aims to investigate the role of the Internet in facilitating drugs trade. It is commissioned by the Research and Documentation Centre (Wetenschappelijk Onderzoek- en Documentatiecentrum, WODC), the independent research arm of the Ministry of Security and Justice in the Netherlands. Special attention will therefore be paid to the role of Dutch actors in facilitating this trade.

(more available)
Added: October 20, 2018
image from Mobile Phishing Report 2018

Mobile Phishing Report 2018

This whitepaper looks at the evolution of mobile phishing - examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile device fleet.

(more available)
Added: October 20, 2018
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

A review of the threat trends from the second quarter of 2018 as seen via ProofPoint’s detection network.

Added: October 20, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2016)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2016)

October 2016 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 20, 2018
image from The 2018 Hacker Report

The 2018 Hacker Report

This report is a kind of dossier on the hacker community. It lets you in to their world, to know their mindset, and thoughts on the bug bounty community.

(more available)
Added: October 20, 2018
image from The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda. As authoritarian regimes seek to undermine democratic institutions, Western societies must harness their current— though fleeting—competitive advantage in technology to prepare for the next great leap forward in political warfare.

(more available)
Added: October 20, 2018
image from Thought Leadership 2016 Programme: Key Findings

Thought Leadership 2016 Programme: Key Findings

The 2016 Thought Leadership programme convened by Corsham Institute, in conjunction with RAND Europe and St George’s House, examined a number of crucial dimensions of our connected society. The programme facilitated the gathering of a diverse set of experts and influential leaders from various sectors to discuss challenges and opportunities, share experiences, and build a network. To give a brief glimpse of these discussions, we have produced this Key Findings report to provide participants, stakeholders and interested parties with a strong sense of both the subjects covered during our deliberations, as well as some of the issues, which still need to be tackled going forward.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 20:08 UTC (build b1d7be4)