Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Core Security

Below you will find reports with the source of “Core Security”

image from Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users
Added: October 21, 2018
image from Impact vs. Metasplout Pro Efficiency Study

Impact vs. Metasplout Pro Efficiency Study

Under most tested scenarios, Core Impact users can expect a notable reduction in both operator time and total elapsed time when performing common penetration testing tasks. (more available)
Added: October 20, 2018
image from Hunting Crypto Secrets In Sap Systems

Hunting Crypto Secrets In Sap Systems

In this paper they share analysis on how cryptographic material and credentials are stored and managed by SAP’s cryptographic libraries.
Added: October 13, 2018
© Cyentia Institute 2021
Library updated: February 25, 2021 04:05 UTC (build 7e736b2)