Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Control systems

Below you will find reports with the tag of “Control systems”

image from Energy Sector Threat Trends Report 2022

Energy Sector Threat Trends Report 2022

The global energy sector is facing a time of uncertainly due to a confluence of geopolitical, economic, and environmental factors. In tandem, the cyber threat landscape is growing increasingly complex, further complicating the picture for global energy suppliers. (more available)
Added: January 18, 2023
image from The State of Vulnerability Management 2022

The State of Vulnerability Management 2022

For this survey, we surveyed 426 security professionals directly responsible for managing cyber vulnerabilities in their day-to-day work. The survey was conducted online via Pollfish using organic sampling. (more available)
Added: January 17, 2023
image from 2022 Securonix Threat Report

2022 Securonix Threat Report

The 2022 Securonix Threat Report highlights the trends, required data, and detection summaries for key trends. Additionally, our report covers the techniques we’ve seen from the trenches across insider threat, cloud infrastructure misuse/abuse, and preemptive ransomware detection. (more available)
Added: January 11, 2023
image from January 2023 Threat Horizon Report

January 2023 Threat Horizon Report

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from throughout Google’s intelligence and security teams. (more available)
Added: January 11, 2023
image from Microsoft Digital Defense Report 2022

Microsoft Digital Defense Report 2022

In the report’s first chapter, we focus on activities of cybercriminals, followed by nation states threats in chapter two. Both groups have greatly increased the sophistication on their attacks which has dramatically increased the impact of their actions. (more available)
Added: November 7, 2022
image from 2022 Vulnerability Management Report

2022 Vulnerability Management Report

The 2022 Vulnerability Management Report is based on a comprehensive survey of over 390 cybersecurity professionals in September 2022 to gain insights into the latest trends, key challenges and solutions preferences for vulnerability management. (more available)
Added: October 12, 2022
image from The State of Secrets Sprawl 2022

The State of Secrets Sprawl 2022

In this report, data reveals that on average, in 2021, a typical company with 400 developers would discover 1,050 unique secrets leaked upon scanning its repositories and commits. (more available)
Added: October 5, 2022
image from 2022 Securing the Edge

2022 Securing the Edge

This AT&T Cybersecurity Insights report is the third in a series that highlights the need for security in a new compute paradigm underpinned by 5G and edge. (more available)
Added: September 13, 2022
image from State of XIoT Security: H1 2022

State of XIoT Security: H1 2022

The State of XIoT Security report is Claroty’s contextual analysis of cyber-physical security. The data presented in this edition of the report covers the first six months of 2022, and sheds light on the key trends and recommended actions you can apply within your enterprise. (more available)
Added: September 9, 2022
image from Global Threat Landscape Report H1 2022

Global Threat Landscape Report H1 2022

In our H1 2022 FortiGuard Labs Threat Landscape Report, we examine the cyber threat landscape during the year’s first half to identify trends and offer recommendations about what CISOs and security teams should pay close attention to in the months ahead. (more available)
Added: August 24, 2022
image from The state of industrial security in 2022

The state of industrial security in 2022

This report takes an in-depth look at lloT/OT security projects, implementation challenges, security incidents, technology investments, and a variety of issues related to cybersecurity risks. (more available)
Added: July 12, 2022
image from Global Threat Landscape Report -H1 2020

Global Threat Landscape Report -H1 2020

The findings in this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting billions of threat events observed in live production environments around the world. (more available)
Added: May 9, 2022
image from Threat Landscape Report Q2 2018

Threat Landscape Report Q2 2018

The Fortinet Threat Landscape Report Q2 2018 features a healthy dose of international intrigue, major disruptions, global infections, innovative malware, clever heists, and more. (more available)
Added: May 5, 2022
image from Emerging Threats Protection Report

Emerging Threats Protection Report

In this report, we have researched the detected new round of offensive and destructive cyberattacks directed against Ukraine’s digital infrastructure and its alliances. (more available)
Added: April 13, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021

This report is the Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021. This report is a resource for OT security managers and operations, delivering not only data about vulnerabilities that are prevalent in industrial devices, but also the necessary context around them to assess risk within their respective environments. (more available)
Added: April 12, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

This is the Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021. This report brings important context to the unique discipline of ICS vulnerability research and managing that risk. (more available)
Added: April 11, 2022
image from European Industrial Infrastructure Cyber Threat Perspective

European Industrial Infrastructure Cyber Threat Perspective

A review of the threat landscape (actors, actions, etc._ affecting industrial infrastructure in Europe.
Added: April 7, 2022
image from Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

We do two very important and timely things in this report. We first explore ways to measure exploitability for individual vulnerabilities—and far more importantly—entire organizations. (more available)
Added: January 20, 2022
image from Public Power Cybersecurity Scorecard 2019 Annual Report

Public Power Cybersecurity Scorecard 2019 Annual Report

This report creates an overall picture of the cybersecurity capabilities of public power utilities. Moreover, it supports the previous year’s findings and provides a consistent approach for supporting DOE’s Multiyear Plan for Energy Sector Cybersecurity. (more available)
Added: January 14, 2022
image from Global Threat Landscape Report: August 2021

Global Threat Landscape Report: August 2021

This is the threat landscape report from Fortinet for the first half of 2021. It covers threat detection changes and attack changes from January to July. (more available)
Added: August 23, 2021
image from Microsoft Digital Defense Report

Microsoft Digital Defense Report

This report looks at cybercrime in 2020, going into the changes in cybercrime, nationwide threats, security involving remote work, and how to improve security. (more available)
Added: December 1, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 6
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)