Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Core Security

Below you will find reports with the source of “Core Security”

image from 2021 Identity and Access Management Report

2021 Identity and Access Management Report

The 2021 Identity and Access Management Report reveals the increasing importance of managing access as part of an organization’s overall risk management and security posture in the new normal of hybrid work locations. The report highlights what is and what is not working for security operations teams in securing access to sensitive data, systems, and applications.

(more available)
Added: October 18, 2022
image from Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users

(more available)
Added: October 21, 2018
image from Impact vs. Metasplout Pro Efficiency Study

Impact vs. Metasplout Pro Efficiency Study

Under most tested scenarios, Core Impact users can expect a notable reduction in both operator time and total elapsed time when performing common penetration testing tasks. This whitepaper presents the repeatable methodology and testing protocol used in our study.

(more available)
Added: October 20, 2018
image from Hunting Crypto Secrets In Sap Systems

Hunting Crypto Secrets In Sap Systems

In this paper they share analysis on how cryptographic material and credentials are stored and managed by SAP’s cryptographic libraries.

(more available)
Added: October 13, 2018
© Cyentia Institute 2025
Library updated: July 12, 2025 16:08 UTC (build b1d7be4)