Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Control Systems

Below you will find reports with the tag of “Control Systems”

image from Global Threat Landscape Report H1 2022

Global Threat Landscape Report H1 2022

In our H1 2022 FortiGuard Labs Threat Landscape Report, we examine the cyber threat landscape during the year’s first half to identify trends and offer recommendations about what CISOs and security teams should pay close attention to in the months ahead. The report’s findings are based on data collected through our global array of sensors monitored by the FortiGuard Labs team.

(more available)
Added: August 24, 2022
image from The state of industrial security in 2022

The state of industrial security in 2022

This report takes an in-depth look at lloT/OT security projects, implementation challenges, security incidents, technology investments, and a variety of issues related to cybersecurity risks.

(more available)
Added: July 12, 2022
image from Global Threat Landscape Report -H1 2020

Global Threat Landscape Report -H1 2020

The findings in this report represent the collective intelligence of FortiGuard Labs, drawn from a vast array of network sensors collecting billions of threat events observed in live production environments around the world.

(more available)
Added: May 9, 2022
image from Threat Landscape Report Q2 2018

Threat Landscape Report Q2 2018

The Fortinet Threat Landscape Report Q2 2018 features a healthy dose of international intrigue, major disruptions, global infections, innovative malware, clever heists, and more.

(more available)
Added: May 5, 2022
image from Emerging Threats Protection Report

Emerging Threats Protection Report

In this report, we have researched the detected new round of offensive and destructive cyberattacks directed against Ukraine’s digital infrastructure and its alliances.

(more available)
Added: April 13, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021

This report is the Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021. This report is a resource for OT security managers and operations, delivering not only data about vulnerabilities that are prevalent in industrial devices, but also the necessary context around them to assess risk within their respective environments.

(more available)
Added: April 12, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

This is the Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021. This report brings important context to the unique discipline of ICS vulnerability research and managing that risk.

(more available)
Added: April 11, 2022
image from European Industrial Infrastructure Cyber Threat Perspective

European Industrial Infrastructure Cyber Threat Perspective

A review of the threat landscape (actors, actions, etc._ affecting industrial infrastructure in Europe.

Added: April 7, 2022
image from Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

We do two very important and timely things in this report. We first explore ways to measure exploitability for individual vulnerabilities—and far more importantly—entire organizations. Second, we create a simulation that seeks to minimize organizational exploitability under varying scenarios combining vulnerability prioritization strategies and remediation capacity. Bottom line: If you’re looking for proven ways to squeeze the most risk reduction from your vulnerability management (VM) efforts, this report is for you.

(more available)
Added: January 20, 2022
image from Public Power Cybersecurity Scorecard 2019 Annual Report

Public Power Cybersecurity Scorecard 2019 Annual Report

This report creates an overall picture of the cybersecurity capabilities of public power utilities. Moreover, it supports the previous year’s findings and provides a consistent approach for supporting DOE’s Multiyear Plan for Energy Sector Cybersecurity.

(more available)
Added: January 14, 2022
image from Global Threat Landscape Report: August 2021

Global Threat Landscape Report: August 2021

This is the threat landscape report from Fortinet for the first half of 2021. It covers threat detection changes and attack changes from January to July.

(more available)
Added: August 23, 2021
image from Microsoft Digital Defense Report

Microsoft Digital Defense Report

This report looks at cybercrime in 2020, going into the changes in cybercrime, nationwide threats, security involving remote work, and how to improve security.

(more available)
Added: December 1, 2020
image from 2020 Unit 42 IoT Threat Report

2020 Unit 42 IoT Threat Report

This annual report looks at changes in internet of things security.

Added: November 1, 2020
image from Connected Medical Device Security: A Deep Dive into Healthcare Networks

Connected Medical Device Security: A Deep Dive into Healthcare Networks

This report analyzes the security of healthcare delivery organizations. It looks at the risks the industry faces and provides effective strategies to reduce cybersecurity risks and defend healthcare networks.

(more available)
Added: October 30, 2020
image from The State of Industrial Cybersecurity in the Era of Digitalization

The State of Industrial Cybersecurity in the Era of Digitalization

An annual survey on the challenges and response to those challenges of cybersecurity in the Industrial Control Systems (ICS) space.

(more available)
Added: October 27, 2020
image from What's Lurking in the Shadows 2020?

What's Lurking in the Shadows 2020?

This report provides recommendations on how companies can manage the threat posed by shadow IoT devices.

Added: September 27, 2020
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

The objective of this report is to provide nuanced insight into the ICS risk and vulnerability landscape, the challenges it poses to operational technology (OT) security practitioners, and what conclusions can be drawn from publicly available data.

(more available)
Added: September 2, 2020
image from The Risk of the Business-Aligned Security Executive

The Risk of the Business-Aligned Security Executive

A survey of 416 security and 425 business executives, combined with telephone interviews of five business and security executives to explore the strategies and practices and medium and large enterprises. Covers board level visibility, explaining the company’s risk posture, risk management, and the role of cybersecurity in business strategy.

(more available)
Added: August 5, 2020
image from 2020 State of Operational Technology and Cybersecurity Report

2020 State of Operational Technology and Cybersecurity Report

A survey of stakeholders in operational technology (OT) environments across four industries: manufacturing, energy and utilities, healthcare, and transportation.

Added: July 7, 2020
image from 2019 HIMSS Cybersecurity Survey

2019 HIMSS Cybersecurity Survey

A survey of 166 US health information security professionals. Discusses the prevalence of significant security events (primarily e-mail based), positive advances in healthcare security, the threat of complacency when managing programs, and area where there are control gaps.

(more available)
Added: June 12, 2020
image from Securing Smart Factories

Securing Smart Factories

A look at the unique threat and risk landscape of the manufacturing industry. Discussing the challenges brought about by Industry 4.0, and recommends measures and best practices for securely reaping the benefits of connected production. We also reiterate that securing the manufacturing industry requires regular risk assessments and a resilient cybersecurity framework that is able to detect, respond to, and protect against a variety of security holes.

(more available)
Added: May 18, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)