Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Audit

Below you will find reports with the tag of “Audit”

image from Kubernetes Deployment And Security Patterns

Kubernetes Deployment And Security Patterns

This is the 2nd ebook from The New Stack’s series focused on the Kubernetes ecosystem. Unlike the 1st ebook that centered on the state of the Kubernetes ecosystem, this ebook shines a light on answering the question: How well does Kubernetes work in production?

(more available)
Added: October 25, 2018
image from Securing The Enterprise's Cloud Assets On Amazon Web Services

Securing The Enterprise's Cloud Assets On Amazon Web Services

This report provides helpful advice on how to secure Cloud Assets on Amazon’s Web Services.

Added: October 25, 2018
image from Definitive Guide To AWS

Definitive Guide To AWS

This is an eBook that discusses securing ata on Amazon Web Services (AWS).

Added: October 24, 2018
image from IoT Security:An IBM Position Paper

IoT Security:An IBM Position Paper

This paper takes a look at how cognitive technologies will impact security in the IoT systems. It addresses a variety of issues related to CIoT and the future that lies ahead.

(more available)
Added: October 24, 2018
image from The Powers Of Identity Governance And Privileged Access Security

The Powers Of Identity Governance And Privileged Access Security

This eBook provides information based on a 2017 survey that reveals the power of identity governance and privileged access security.

(more available)
Added: October 24, 2018
image from ZCash Ceremony And Audit

ZCash Ceremony And Audit

This report is based on a security audit of the opening ceremony of ZCash.

Added: October 24, 2018
image from 2018 Cloud Security Report

2018 Cloud Security Report

Offering insight into a variety of issues related to cloud security, this report discusses several key issues, including, the biggest threats to cloud security, legacy security tools that do not work in the cloud, and the growth of cloud security budgets.

(more available)
Added: October 23, 2018
image from Security Practices Guide For SOC 2 Compliance

Security Practices Guide For SOC 2 Compliance

This is a short guide for helping organizations become SOC 2 compliant.

Added: October 23, 2018
image from Threat Intelligence Executive Report 2017: Volume 1

Threat Intelligence Executive Report 2017: Volume 1

This Threat Report takes a look at some of the events of Early 2017. Specifically, it looks at how weak and outdated software enabled breaches, threats leveraged legitimate features, threat groups targeted organizations for espionage, and Shamoon wiper malware re-emerged.

(more available)
Added: October 23, 2018
image from Cloud Security Report 2017: Security At Speed And Scale

Cloud Security Report 2017: Security At Speed And Scale

In Threat Stack Cloud Security Report 2017: Security at Speed & Scale, they set out to determine how Operations, Security, and DevOps professionals are dealing with increasingly complex environments, using limited resources, as they seek to satisfy internal and external security demands along with compliance requirements. They also wanted to see how the rise of containerization is impacting this already complex dynamic. To accomplish this, they teamed with ESG Global to survey the organizations and individuals responsible for securing cloud-based applications within their organizations.

(more available)
Added: October 21, 2018
image from Prevent Healthcare Data Breaches With Indentity Management

Prevent Healthcare Data Breaches With Indentity Management

Learn how Single Sign-On and identity management can be used for the healthcare industry. In 2016 alone, over 15 million medical records were stolen due to data breaches. The risks associated with security and identity management are higher in healthcare than any other industry.

(more available)
Added: October 21, 2018
image from Targeted Attacks: Why Are We Missing The Big Picture

Targeted Attacks: Why Are We Missing The Big Picture

This report takes a look at the reality that even though we spend lots of money to protect people from targeted attacks, they still continue to happen. Why are we missing the mark, and what can we change?

(more available)
Added: October 21, 2018
image from TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

This report provides an analysis of TPM Genie. TPM Genie is a serial bus interposer which has been designed to aid in the security research of Trusted Platform Module hardware. The tool demonstrates that a man-in- the-middle on the TPM serial bus can undermine many of the stated purposes of the TPM such as measured boot, remote attestation, sealed storage, and the hardware random number generator.

(more available)
Added: October 21, 2018
image from Fail To Plan, Plan To Fail

Fail To Plan, Plan To Fail

This paper is the result of a Forrester survey that sought to understand the roles of LoB practitioners and SOCs in securing IoT environments.

(more available)
Added: October 20, 2018
image from Biometrics: Introducing The Future Of Authentication

Biometrics: Introducing The Future Of Authentication

This report takes a look at Biometrics and how it can become a great cybersecurity measure.

Added: October 19, 2018
image from Software Asset Management.Next

Software Asset Management.Next

This paper seeks to help organizations understand the future of Software Asset Management.

Added: October 19, 2018
image from The True Cost Of Compliance With Data Protection Regulations

The True Cost Of Compliance With Data Protection Regulations

Ponemon Institute and Globalscape conducted The True Cost of Compliance with Data Protection Regulations to determine the full economic impact of compliance activities for a representative sample of 53 multinational organizations. An earlier study was completed in 2011 and those findings are compared to this year’s results.

(more available)
Added: October 19, 2018
image from 2017 Open Source Security & Risk Analysis

2017 Open Source Security & Risk Analysis

This report includes insights and recommendations intended to help organi- zations and their security, risk, legal, and development teams better understand the open source security and license risk landscape as they strive to improve their application risk management processes.

(more available)
Added: October 18, 2018
image from GDPR Compliancy: A Global Change Is On Its Way

GDPR Compliancy: A Global Change Is On Its Way

In this short article, they provide a quick ability to understand the GDPR and how it will impact the world.

(more available)
Added: October 18, 2018
image from Generations of Machine Learning In Cybersecurity

Generations of Machine Learning In Cybersecurity

In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. In addition, the paper seeks to explain that while a great deal of progress has been made in the evolution of machine learning’s application to cybersecurity challenges, there remains an immense amount of opportunity for innovation and advancement in the field, and they expect the sophistication of applications of machine learning to continue to evolve over time.

(more available)
Added: October 18, 2018
image from Vendor Selection & GDPR Compliance

Vendor Selection & GDPR Compliance

This report offers a unique approach to understanding GDPR compliance. The report is a presentation of an interview with two individual CEO’s from two seperate companies.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)