Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from 7 Most Unsafe Gaps For Industrial Cyber Security

7 Most Unsafe Gaps For Industrial Cyber Security

Indegy provides a helpful graphic designed to reveal seven critical areas in the area of industrial cyber security.

Added: March 16, 2019
image from Threat Report: Medical Devices

Threat Report: Medical Devices

This report takes a specific look back at connected medical device events that occurred in 2017.

Added: March 9, 2019
image from The State of Industrial Cybersecurity 2018

The State of Industrial Cybersecurity 2018

In June of 2018 Claroty asked the experts about the state of industrial cybersecurity. This paper discusses what they said.

(more available)
Added: March 9, 2019
image from Commonalities in Vehicle Vulnerabilities

Commonalities in Vehicle Vulnerabilities

This paper is a follow-up to IOActive’s 2016 report1 on vehicle vulnerabilities. The goal of this paper is to revisit the topic using data from the past two years (2016, 2017) and to compare this information to previous findings to analyze how the industry is progressing.

(more available)
Added: March 9, 2019
image from Hacking Robots Before Skynet

Hacking Robots Before Skynet

From the Report, “This paper is based on our own research, in which we discovered critical cybersecurity issues in several robots from multiple vendors. While we assist the vendors in addressing the cybersecurity vulnerabilities identified, we want to describe the currently available technology, some of the threats posed by a compromised robot, and the types of cybersecurity issues we discovered. The goal is to make robots more secure and prevent vulnerabilities from being used maliciously by attackers to cause serious harm to businesses, consumers, and their surroundings.”

(more available)
Added: March 9, 2019
image from Go Nuclear: Breaking Radiation Monitoring Devices

Go Nuclear: Breaking Radiation Monitoring Devices

The purpose of this research is to provide a comprehensive description of the technical details and approach IOActive used to discover vulnerabilities affecting widely deployed radiation monitoring devices. Our work involved software and firmware reverse engineering, RF analysis, and hardware hacking.

(more available)
Added: March 9, 2019
image from Industrial Networks Secured

Industrial Networks Secured

This case study, focuses on one of Claroty’s power plant installations. It illustrates challenges and solutions that are both unique to the power generation sub-segment, as well those that apply to the broader context of OT cybersecurity.

(more available)
Added: March 9, 2019
image from Top Three Use Cases: Automated OT Asset Discovery and Management

Top Three Use Cases: Automated OT Asset Discovery and Management

This report takes an inside look at Industrial Control Systems and the need for them to be updated for the new Cyber Security Threats.

(more available)
Added: March 9, 2019
image from The Ultimate Guide to Incident Management for Higher Education

The Ultimate Guide to Incident Management for Higher Education

This report offers insight for institutions of higher learning seeking to understand that regulations and issues surrounding cybersecurity on campus.

(more available)
Added: March 7, 2019
image from Hacker's Playbook 3rd Edition: Q4 2017

Hacker's Playbook 3rd Edition: Q4 2017

This third edition of the Hacker’s Playbook Findings Report continues in the tradition of reporting enterprise security trends from the point of view of an attacker. The findings represent anonymized data from many millions of SafeBreach breach methods executed within real production environments. This edition includes existing Hacker’s Playbook Findings Report data and new data from deployments between January 2017 and November 2017, with a combination of over 3,400 total breach methods and almost 11.5 million simulations completed. This report reflects which attacks are blocked, which are successful, and key trends and findings based on actual security controller effectiveness.

(more available)
Added: March 7, 2019
image from 2018 Top Cybersecurity Threats

2018 Top Cybersecurity Threats

This year, NopSec predicts that the biggest cyber threats will be massive data breaches, ransomware, opportunistic crypto-mining attacks and IoT hacking.

(more available)
Added: March 6, 2019
image from Mobile Security Index 2019

Mobile Security Index 2019

It’s been another headline-grabbing 12 months for cybersecurity. There were many large and damaging compromises affecting retailers, airlines and credit rating companies, to name just a few. Thousands of organizations weren’t prepared and had sensitive data stolen, suffered downtime of key systems or were affected in some other way. Are you ready?

(more available)
Added: March 6, 2019
image from Quarterly Threat Report

Quarterly Threat Report

This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. We provide an assessment of threat events by organization size and industry, and examine threat incident patterns identified through guidance from security specialists. We also further explore inbound activity to our honeypot network to identify trends and patterns that reveal rising new threats, such as Android Debug Bridge (ADB) activity, the persistence of old threats such as EternalBlue, and the vulnerability posed by non-novel credentials as revealed to publicly exposed systems. The report concludes with five steps you can take to bolster your organization’s security posture in 2019 and beyond, based on our findings.

(more available)
Added: March 6, 2019
image from State of the Internet/Security Retail Attacks and API Traffic

State of the Internet/Security Retail Attacks and API Traffic

From the report, “All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked.”

(more available)
Added: March 1, 2019
image from Network Security Forecast For 2019

Network Security Forecast For 2019

“It’s difficult to make forecasts, especially about the future,” mused movie mogul, Samuel Goldwyn. With the rapid changes in digital transformation, 2019 is likely to surprise us in significant ways. But one thing is certain: IT predictions for 2019 will include swift expansion into the cloud and solutions for the myriad challenges of providing security, compliance and business continuance across the growing on premise and cloud estates.

(more available)
Added: February 17, 2019
image from Life Inside The Perimeter: Understanding The Modern CISO

Life Inside The Perimeter: Understanding The Modern CISO

Nominet commissioned Osterman Research to conduct a survey of 408 CISOs overseeing security for organisations with a mean average of 8,942 employees. This comprises 207 companies in the USA and 201 companies in the UK, spread across a range of sectors. The objective was to collect and analyse a large enough dataset to make valid conclusions into the opinions, behaviours and mindset of those making cyber security decisions at large organisations.

(more available)
Added: February 17, 2019
image from Beyond Uncle Sam: Analyzing The Security Posture Of U.S. Government Contractors And Subcontrators

Beyond Uncle Sam: Analyzing The Security Posture Of U.S. Government Contractors And Subcontrators

From the report, “A growing list of contractors and subcontractors have disclosed that they have been victims of data breaches resulting in the compromise of sensitive government information. In response, U.S. federal agencies have or are considering expanding cybersecurity requirements for their contractor base and adopting best practices for evaluating and monitoring those entities. In a recent study, BitSight found a large gap in the security posture between financial organizations and their third parties. This BitSight Insights report explores a similar question: what is the cybersecurity performance of U.S. federal contractors, and how does that compare to the performance of U.S. federal agencies?”

(more available)
Added: February 17, 2019
image from How Secure Are America's Largest Business Partners

How Secure Are America's Largest Business Partners

A review of the observed (externally facing) security practices of the Fortune 1000 firms.

Added: February 17, 2019
image from 2019 Endpoint Security Survey Report

2019 Endpoint Security Survey Report

The 2019 Endpoint Security Survey Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing.

(more available)
Added: February 17, 2019
image from The Network Security Policy Management Lifecycle: How A Lifecycle Approach Improves Business Agility, Reduces Risks, and Lowers Costs

The Network Security Policy Management Lifecycle: How A Lifecycle Approach Improves Business Agility, Reduces Risks, and Lowers Costs

IT security organizations today are judged on how they enable business transformation and innovation. They are tasked with delivering new applications to users and introducing new technologies that will capture new customers, improve productivity and lower costs. They are expected to be agile so they can respond faster than competitors to changing customer and market needs.

(more available)
Added: February 17, 2019
image from Devopsifying Network Security

Devopsifying Network Security

From the report, “This technical whitepaper presents and discusses the concept of “Connectivity as Code”, a complementary concept to “Infrastructure as Code” (IaC), and we will explain how it can be incorporated into the DevOps lifecycle for a more agile application delivery. We will also describe how empowering the developer to define the application’s connectivity requirements will bridge the gap between developers and network security, and help to automate the application delivery process end-to-end. The solution presented in this whitepaper seamlessly weaves network connectivity into the DevOps methodology, while ensuring continuous compliance, so that automation does not compromise security.”

(more available)
Added: February 17, 2019
  • ««
  • «
  • 18
  • 19
  • 20
  • 21
  • 22
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 00:08 UTC (build b1d7be4)