Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from 2018 Security Report

2018 Security Report

This report takes a look at 5 key trends that are shaping IT security practices, with findings that provide insight into customer challenges, threat actor behavior, and the global threat landscape.

(more available)
Added: October 23, 2018
image from 2018 Sonicwall Cyber Threat Report

2018 Sonicwall Cyber Threat Report

Subtitled, “Threat Intelligence, Industry Analysis, and Cybersecurity Guidance, for the Global Cyber Arms Race,” this report seeks to fully disclose the research done by the authors, in order to aid all of those involved in the cybersecurity realm.

(more available)
Added: October 23, 2018
image from 6 Principles For DevOps Security At Scale

6 Principles For DevOps Security At Scale

DevOps and security leaders recognize that DevOps requires a fresh approach to security that mitigates risk and uncertainty without impairing velocity. This e-book presents six guiding principles for enabling DevOps security at scale.

(more available)
Added: October 23, 2018
image from A Framework For Exploring Cybersecurity Policy Options

A Framework For Exploring Cybersecurity Policy Options

The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other.

(more available)
Added: October 23, 2018
image from Crossing The Last Mile Of IoT Security Cyber Risk

Crossing The Last Mile Of IoT Security Cyber Risk

This paper seeks to provide understanding and aid with meeting the unique information demands that the Internet of Things requires.

(more available)
Added: October 23, 2018
image from Cyber Threat Landscape: The Aviation Industry

Cyber Threat Landscape: The Aviation Industry

This paper focusses completely on cybersecurity issues in the aviation industry.

Added: October 23, 2018
image from GTIC Monthly Threat Report September 2017

GTIC Monthly Threat Report September 2017

This monthly threat report takes a look at the month of September 2017. More specifically, it takes a look at VULNS, Apache Exploits, and the Equifax breach.

(more available)
Added: October 23, 2018
image from Ironclad API's:An Approach For Application Security Testing

Ironclad API's:An Approach For Application Security Testing

This paper discusses some API’s and how you can protect them from an attack.

Added: October 23, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of various mobile app security methods including per-app VPN, containers, and micro-segmentation.”

(more available)
Added: October 23, 2018
image from Prepare For Battle:Building An Incident Response Plan

Prepare For Battle:Building An Incident Response Plan

This report provides a walkthrough of creating an Incident Response Plan.

Added: October 23, 2018
image from Quarterly Report Q4 2017

Quarterly Report Q4 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 23, 2018
image from Reporting on Risk to the Board

Reporting on Risk to the Board

This is a good report to read if you are interested in learning how to properly, and succesfully, report risks and vulnerabilities to boardmembers and executives.

(more available)
Added: October 23, 2018
image from Security Analytics And Operations In Transition

Security Analytics And Operations In Transition

This report seeks to offer insight into the cybersecurity world and to analyze the dangers and pitfalls of the transition in the profession.

(more available)
Added: October 23, 2018
image from Security In The Golden Age Of Cybercrime

Security In The Golden Age Of Cybercrime

This paper offers insight into an exploration of network cybersecurity in the U.S. Federal Government.

Added: October 23, 2018
image from Security Intelligence Report Volume 19

Security Intelligence Report Volume 19

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 23, 2018
image from Soft Target:The Top 10 Vulnerabilities Used by Cybercriminals

Soft Target:The Top 10 Vulnerabilities Used by Cybercriminals

This annual report takes a look at the most popular vulnerabilites used by cybercriminals. It intends to help organizations make good, informed decisions about their cyber security.

(more available)
Added: October 23, 2018
image from State of the Internet - Security Q3 2016 report

State of the Internet - Security Q3 2016 report

In the Akamai State of the Internet - Security Report, you’ll get detailed cloud security insights about DDoS and web application attack trends observed across the Akamai Intelligent Platform™ for Q3 2016.

(more available)
Added: October 23, 2018
image from Threat Advisory: Anato

Threat Advisory: Anato

This is a threat advisory for Anato

Added: October 23, 2018
image from Web Application Attack Statistics Q4 2017

Web Application Attack Statistics Q4 2017

This report provides statistics on attacks performed against web applications during the fourth quarter of 2017.

Added: October 23, 2018
image from What A Hacker Sees: Top 20 CIS Critical Security Controls

What A Hacker Sees: Top 20 CIS Critical Security Controls

This paper discusses the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC) come into play, providing organizations with 20 key controls that they can implement to mitigate some of the threats they are facing.

(more available)
Added: October 23, 2018
image from 2015 Data Breach Investigations Report

2015 Data Breach Investigations Report

Verizon’s annual report on all data breaches in 2015

Added: October 22, 2018
  • ««
  • «
  • 31
  • 32
  • 33
  • 34
  • 35
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)