Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Core Security

Below you will find reports with the source of “Core Security”

image from Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users
Added: October 21, 2018
image from Impact vs. Metasplout Pro Efficiency Study

Impact vs. Metasplout Pro Efficiency Study

Under most tested scenarios, Core Impact users can expect a notable reduction in both operator time and total elapsed time when performing common penetration testing tasks. (more available)
Added: October 20, 2018
image from Hunting Crypto Secrets In Sap Systems

Hunting Crypto Secrets In Sap Systems

In this paper they share analysis on how cryptographic material and credentials are stored and managed by SAP’s cryptographic libraries.
Added: October 13, 2018
© Cyentia Institute 2022
Library updated: May 28, 2022 08:08 UTC (build d6199b1)