Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Startup

Below you will find reports with the tag of “Startup”

image from Now Tech: Container Security, Q4 2018

Now Tech: Container Security, Q4 2018

You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you’ll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security pros should use Forrester’s Now Tech report to understand the value they can expect from a container security provider and select vendors based on size and functionality.

(more available)
Added: November 20, 2018
image from MM Core In-Memory Backdoor Returns as "BigBoss" and "SillyGoose"

MM Core In-Memory Backdoor Returns as "BigBoss" and "SillyGoose"

In this blog we will detail our discovery of the next two versions of MM Core, namely “BigBoss” (2.2-LNK) and “SillyGoose” (2.3-LNK). Attacks using “BigBoss” appear likely to have occurred since mid-2015, whereas “SillyGoose” appears to have been distributed since September 2016. Both versions still appear to be active.

(more available)
Added: November 15, 2018
image from China's Cyber Superpower Strategy: Implementation, Internet Freedom Implications, and U.S. Responses

China's Cyber Superpower Strategy: Implementation, Internet Freedom Implications, and U.S. Responses

This report is a transcript of written Testimony provided to the House Comittee on Oversight and Government Reform, Subcomittee on Information Technology, by Sarah Cook Senior Research analyst for East Asia and China Media Bulletin Director.

(more available)
Added: November 6, 2018
image from BDO 2017 Cyber Governance Survey

BDO 2017 Cyber Governance Survey

This survey was created to act as a barometer to measure the involvement of public company directors in cyber-risk management.

(more available)
Added: October 23, 2018
image from Accelerate: State Of DevOps Strategies For A New Economy

Accelerate: State Of DevOps Strategies For A New Economy

This report examines the impact that cloud adoption, use of open source software, organizational practices (including outsourcing), and culture all have on software delivery performance.

(more available)
Added: October 21, 2018
image from Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

Remote Control Interloper:Analyzing New Chinese htpRAT Malware Attacks Against ASEAN

This report discusses a new kind of Remote Access Trojan at use in ASIA, and looks at its connection with the Chinese Government.

(more available)
Added: October 21, 2018
image from Coporate IT Security Risks Special Report Series 2016

Coporate IT Security Risks Special Report Series 2016

In order to find out more about the challenges and threats businesses are encountering, Kaspersky Lab, together with B2B International, has conducted a study entitled Corporate IT Security Risks Survey 2016. We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyber threats.

(more available)
Added: October 20, 2018
image from Internet Trends 2017 Code Conference

Internet Trends 2017 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 20, 2018
image from ASEC Report Volume 85 January 2017

ASEC Report Volume 85 January 2017

This report from the Ahn Lab Security Emergency Response Center provides a review of various Cyber events that took place in January of 2017.

(more available)
Added: October 16, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

The fifth annual State of DevOps Report confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns.

(more available)
Added: October 15, 2018
image from Going After The Weak Link: Security In Mergers & Acquisitions

Going After The Weak Link: Security In Mergers & Acquisitions

This report discusses the security issues involved in mergers and acquisitions of other organizations.

Added: October 13, 2018
image from Taking The Offensive

Taking The Offensive

This paper discusses the necessary element of collaboration that is required for success fighting cybercrime.

Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 11, 2025 04:08 UTC (build b1d7be4)