Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Core Security

Below you will find reports with the source of “Core Security”

image from 2021 Identity and Access Management Report

2021 Identity and Access Management Report

The 2021 Identity and Access Management Report reveals the increasing importance of managing access as part of an organization’s overall risk management and security posture in the new normal of hybrid work locations. (more available)
Added: October 18, 2022
image from Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication

Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users
Added: October 21, 2018
image from Impact vs. Metasplout Pro Efficiency Study

Impact vs. Metasplout Pro Efficiency Study

Under most tested scenarios, Core Impact users can expect a notable reduction in both operator time and total elapsed time when performing common penetration testing tasks. (more available)
Added: October 20, 2018
image from Hunting Crypto Secrets In Sap Systems

Hunting Crypto Secrets In Sap Systems

In this paper they share analysis on how cryptographic material and credentials are stored and managed by SAP’s cryptographic libraries.
Added: October 13, 2018
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)