Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from CakePHP Security Assessment

CakePHP Security Assessment

This report is based on a study done in 2017 to analyze security issues in CakePHP.

Added: October 14, 2018
image from Cloud Security Report 2017

Cloud Security Report 2017

This report includes research on the evolving state of cloud security.

Added: October 14, 2018
image from Cyber Vulnerability: Where do you Stand

Cyber Vulnerability: Where do you Stand

This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data.

(more available)
Added: October 14, 2018
image from Data Thieves: The Motivations Of Cyber Threat Actors And Their Use And Monetization Of Stolen Data

Data Thieves: The Motivations Of Cyber Threat Actors And Their Use And Monetization Of Stolen Data

This paper presents the Testimony of Lillian Ablon before the Committee on Financial Services Subcommittee on Terrorism and Illicit Finance United States House of Representatives on March 15, 2018

(more available)
Added: October 14, 2018
image from Fortinet Threat Landscape Report Q1 2017

Fortinet Threat Landscape Report Q1 2017

In this report, you’ll find a few highlights of what FortiGuard Labs analysts gleaned from Q1 intelligence collections. After that, they hope you’ll hang around while they dig deep into the threat landscape to unearth nuggets of insight you definitely won’t want to miss.

(more available)
Added: October 14, 2018
image from H2 2017 Global Cyber Attack Trends Report

H2 2017 Global Cyber Attack Trends Report

This report takes a look back at the events of the last year and ponders what might occur in 2018.

(more available)
Added: October 14, 2018
image from Protecting The Crown Jewels In The Pivot To Digital Transformation

Protecting The Crown Jewels In The Pivot To Digital Transformation

This white paper by Onapsis and HMG Strategy will explore best practices for securing vital information contained in SAP and Oracle systems for those organizations that are shifting to a digital environment. In the pages that follow, discover the top security risks associated with mission-critical systems along with recommended approaches for mitigating those risks.

(more available)
Added: October 14, 2018
image from Quarterly Threat Report:Second Quarter 2017

Quarterly Threat Report:Second Quarter 2017

This is Rapid7’s Quarterly Threat Report, in this report they sought to include composite and industry-level views of events across many industries.

(more available)
Added: October 14, 2018
image from Southeast Asia: Cyber Threat Landscape

Southeast Asia: Cyber Threat Landscape

This report discusses trends in the cyber security environment in Southeast Asia from January to June 2015. We will review some recent cases of attempted breaches on companies and governments, and provide an update on a group we first identified in 2013 as APT.Nineblog.

(more available)
Added: October 14, 2018
image from Table Of Experts: Cybersecurity

Table Of Experts: Cybersecurity

This article asks some experts local to the Boston area about CyberSecurity. It provides for interesting discussion and insight.

Added: October 14, 2018
image from The Essential Guide To Securing Remote Access

The Essential Guide To Securing Remote Access

This guide will cover the different threats to each area with real-world examples, including exploits that affect remote access software and storage, and provide solutions and security best practice recommendations to help your organization protect against a data breach.

(more available)
Added: October 14, 2018
image from The Reign Of Ransomware

The Reign Of Ransomware

In this report, we round up all the significant security stories during the first half of 2016 to encourage businesses to check for vulnerabilities cybercriminals may abuse. Our report also aims to highlight the need for enterprises to be vigilant in finding solutions that would stop cybercriminals from winning and letting our prediction become their reality.

(more available)
Added: October 14, 2018
image from The Rise of Nation State Attacks

The Rise of Nation State Attacks

The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation state attacks due to an uncertainty as to what a nation state attack is and how to identify the key characteristics, methods and motives of these attacks that originate with foreign governments.

(more available)
Added: October 14, 2018
image from The State of Bug Bounty 2016

The State of Bug Bounty 2016

This is an annual report that provides an inside look into the economics and emerging trends of bug bounties, with data collected from Bugcrowd’s platform and other sources throughout 2016. This report is published on a yearly basis for CISOs and other security decision makers to provide a transparent look at the evolving bug bounty market.

(more available)
Added: October 14, 2018
image from Under Threat or Compromise

Under Threat or Compromise

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape.

(more available)
Added: October 14, 2018
image from What's Hindering Interoperability Across Healthcare Networks

What's Hindering Interoperability Across Healthcare Networks

Interoperability between healthcare networks is a major goal and a major challenge for many healthcare providers. Combining today’s advanced cyberthreats and the challenges of HIPAA compliance makes sharing PHI a daunting task for many healthcare groups. Read this paper to learn how interoperability and HIPAA compliance are achievable.

(more available)
Added: October 14, 2018
image from 2015 Internet Security Threat Report, Volume 20

2015 Internet Security Threat Report, Volume 20

This annual Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

(more available)
Added: October 13, 2018
image from 2017 State Of Bug Bounty Report

2017 State Of Bug Bounty Report

This report mines that data and details to provide an inside look to the economics and emerging trends of managed bug bounty programs.

(more available)
Added: October 13, 2018
image from Android Security: 2015 Year In Review

Android Security: 2015 Year In Review

From the report, “We consider transparency to be critical, so our second annual Android Security Year in Review is intended to share the progress we’ve made with regards to security in the last year, as well as provide our view of the state of security in the Android ecosystem.”

(more available)
Added: October 13, 2018
image from Annual Report 2015

Annual Report 2015

This report concludes that in 2015, cyber attacks grew at an alarming rate, and makes the prediction that Cryptolocker will continue to be a cyber threat. It also discusses the Internet of Things and how those devices can be turned into tools for cyber criminals. It also concluded that the data thefts that have occurred make it clear that businesses have a protection deficit that they need to work on immediately.

(more available)
Added: October 13, 2018
image from Continuous Monitoring And Compliance In The Cloud

Continuous Monitoring And Compliance In The Cloud

This whitepaper takes a look at the issues of using and implementing continuous monitoring and maintaining government compliance.

Added: October 13, 2018
  • ««
  • «
  • 41
  • 42
  • 43
  • 44
  • 45
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)