Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from Vulnerability Review

Vulnerability Review

The annual Vulnerability Review analyzes the evolution of software security from a vulnerability perspective. The review presents global data on the prevalence of vulnerabilities and the availability of patches, maps the security threats to IT infrastructures, and also explores vulnerabilities in the 50 most popular applications on private PCs.

(more available)
Added: October 20, 2018
image from Web Attack Survival Guide

Web Attack Survival Guide

This guide provides a playbook for helping a company prepare for and handle web attacks.

Added: October 20, 2018
image from Website Security Statistic Report

Website Security Statistic Report

From the report, “Rather than provide a lengthy analysis of the data in this Stats Report in this introduction, we’ve decided instead to provide some “what this means to you” commentary at the end of the three main sections of the report; commentary that attempts to make the data relevant to Executives, Security practitioners and DevOps professionals. Security is a concern that spans multiple teams in an organization – from the board and C-suite, to IT and development teams, to the security team and beyond – and the data in this report will mean different things to these different audiences.”

(more available)
Added: October 20, 2018
image from Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

Western European Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In Western Cities

This paper takes a look at the cities of the west, and the cyber threats that occurred there.

Added: October 20, 2018
image from 2015 Vulnerability Review

2015 Vulnerability Review

Published in March of 2015, this report reviews the key figures and facts on vulnerabilities from a global information security perspective.

(more available)
Added: October 19, 2018
image from 2016 Mobile Security Report

2016 Mobile Security Report

From the report, “We present this report, gleaned from our database of mobile security intelligence, to help IT and security pros make informed decisions about managing and securing mobile devices, mobile apps, and their enterprises’ mobile ecosystem.”

(more available)
Added: October 19, 2018
image from 2017 Web Application Threat Trend Report

2017 Web Application Threat Trend Report

Readers are encouraged to use this report to get a better understanding of the current threat landscape, including trends specific to different contexts like region, time of day, industry, and more, in order to better fine-tune defenses for meeting the security needs of their unique environments.

(more available)
Added: October 19, 2018
image from CENTRI 2017 Security Report Research And Roundtable

CENTRI 2017 Security Report Research And Roundtable

The purpose of this report is to look at some of the key security issues the industry is facing now in terms of what problems exist and possible solutions. It also looks at what’s being done, what’s not being done, and what should and could be done.

(more available)
Added: October 19, 2018
image from Dell Security Annual Threat Report 2016

Dell Security Annual Threat Report 2016

This annual report aims to help organizations prevent attacks.

Added: October 19, 2018
image from ENISA Threat Landscape Report 2016

ENISA Threat Landscape Report 2016

In the following report, we give an overview of the top cyber-threats assessed in 2016. By concentrating more on the cyber-threats, ETL 2016 is more streamlined towards the details of cyber threats, while it provides information on threat agents and attack vectors. Based on this material, we deliver our conclusions for policy makers, businesses and research.

(more available)
Added: October 19, 2018
image from French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

This paper takes a look at the cities of France, and the cyber threats that occurred there.

Added: October 19, 2018
image from Global Advanced Threat Landscape Survey 2018: Focus On DevOps

Global Advanced Threat Landscape Survey 2018: Focus On DevOps

The CyberArk Advanced Threat Landscape 2018 annual report is the 11th of its kind and will be released in three parts. This is part one, focusing on how privileged account security is incorporated into DevOps processes.

(more available)
Added: October 19, 2018
image from Global Application & Network Security Report 2017-2018

Global Application & Network Security Report 2017-2018

This report highlights the trends and threats of 2017 as observed by Radware.

Added: October 19, 2018
image from Global Cyberspace Is Safer Than You Think

Global Cyberspace Is Safer Than You Think

This paper argues that the level of security in cyberspace is actually far better than the picture described by media accounts and IT security reports.

(more available)
Added: October 19, 2018
image from Internet Security Threat Report 2016

Internet Security Threat Report 2016

This report details 6 key findings from Symantec’s breakdown of the security issues of 2016.

Added: October 19, 2018
image from Mobile Banking: Big Business, Big Target, Big Opportunity

Mobile Banking: Big Business, Big Target, Big Opportunity

This report provides insights into the security issues surrounding Mobile Banking.

Added: October 19, 2018
image from Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

A quick and effecient article discussing why the new ransomware is dangerous.

Added: October 19, 2018
image from State of the Internet/Security Q4 2015 report

State of the Internet/Security Q4 2015 report

This report gives a detailed breakdown of DDoS attacks in Q4 of 2015.

Added: October 19, 2018
image from The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018

As we approach critical mass of hacker-powered security, read on to learn more about best practices of starting and running effective disclosure and bug bounty programs, and get to know some of the stories and stats about the hackers themselves.

(more available)
Added: October 19, 2018
image from The Weaponization Of Information: The Need For Cognitive Security

The Weaponization Of Information: The Need For Cognitive Security

This paper presents the Testimony of Rand Waltzman presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017.

(more available)
Added: October 19, 2018
image from Threat Landscape Report Q4 2017

Threat Landscape Report Q4 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 19, 2018
  • ««
  • «
  • 35
  • 36
  • 37
  • 38
  • 39
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)