Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Control Systems

Below you will find reports with the tag of “Control Systems”

image from Security Sector Reform In Ukraine

Security Sector Reform In Ukraine

This report provides a series of recommendations for the reform of Ukraine’s security and defense institutions. It covers a wide range of topics including cyber warfare. This research was under- taken in response to a request by the presidential administration of Ukraine and in participation with the National Security and Defense Council and sponsored by Ukraine Investment Alliance, a 501(c)(4) foundation. Research for this report was completed in the fall of 2015. Although some minor updates have been made, the analysis predomi- nantly reflects the situation as of that time.

(more available)
Added: October 26, 2018
image from 2015 Centri Data Breach Report

2015 Centri Data Breach Report

This industry report attempts to answer the question: Why are cyberattacks still successful? Along the way it examines the types of problems that enterprises face, common types of attacks, the true cost of data breaches to major organizations and the tools available today to mitigate these threats.

(more available)
Added: October 25, 2018
image from Cyber Value Connection

Cyber Value Connection

This report was created to present The Cyber-Value Connection, which is intended to put cyber security in a context that will resonate with business leaders. The Cyber-Value Connection looks at the reduction in company value that arises from a cyber breach, vividly demonstrating how a sever incident leads to a decline in share price.

(more available)
Added: October 25, 2018
image from Securing Operational Technology: How Vulnerable Is Our Critical National Infrastructure

Securing Operational Technology: How Vulnerable Is Our Critical National Infrastructure

This paper looks at utilitiy providers and the cybersecurity threats that attack them.

Added: October 25, 2018
image from Targeted Brand Attacks and Mass Credential Exposures

Targeted Brand Attacks and Mass Credential Exposures

This report helps detail the importance of monitoring suspicious domain registrations to protect a brand from being destroyed by cyber criminals.

(more available)
Added: October 25, 2018
image from Threat Intelligence: Cyberattacks And The Utility Industry

Threat Intelligence: Cyberattacks And The Utility Industry

This report takes a look at how cyberattacks impact the utility industry.

Added: October 25, 2018
image from Is Cyber Risk Systemic?

Is Cyber Risk Systemic?

In this report, they examine the results of a survey that attempted to provide a deeper understanding of the views of the likelihood and impact of a systemic cyber-attack.

(more available)
Added: October 24, 2018
image from The Internet Of Things Requires A Security Rethink

The Internet Of Things Requires A Security Rethink

This paper takes a good look at the new era that is being ushered in by the Internet Of Things. It discusses the “perfect storm” that is being created by the issues and innovations ahead.

(more available)
Added: October 24, 2018
image from The Powers Of Identity Governance And Privileged Access Security

The Powers Of Identity Governance And Privileged Access Security

This eBook provides information based on a 2017 survey that reveals the power of identity governance and privileged access security.

(more available)
Added: October 24, 2018
image from ZCash Ceremony And Audit

ZCash Ceremony And Audit

This report is based on a security audit of the opening ceremony of ZCash.

Added: October 24, 2018
image from Cyber Threatscape Report 2018

Cyber Threatscape Report 2018

This report provides detailed information about Iranian Threat, Extended Supply Chain Threats, Critical Infrastructure, Advanced Persistent Threats, Miner Malware, and Ransomware.

(more available)
Added: October 23, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration.

(more available)
Added: October 22, 2018
image from Report Summary: Network Management Megatrends 2016

Report Summary: Network Management Megatrends 2016

This is the fourth megatrends study. For this latest version, they have carried forward a number of ongoing questions and threads that are designed to track how the network management landscape is changing over time. They’ve also included many new questions and queries intended to help us characterize and quantify the very latest technology trends. In particular, new questions were added in this report to begin assessing whether hybrid clouds, advanced analytics, and/or the Internet of Things were having an impact on network management tools and practices.

(more available)
Added: October 22, 2018
image from The Four Types Of Threat Detection

The Four Types Of Threat Detection

There is a considerable amount of market confusion around the types of threat detection, how they are derived, and the uses for each. The purpose of this paper is to address those challenges by identifying the four types of threat detection and offering sample use-cases focused on industrial control system (ICS) and industrial internet of things (IIoT) environments.

(more available)
Added: October 22, 2018
image from The State Of Industrial Cybersecurity 2018

The State Of Industrial Cybersecurity 2018

The present trend study “The State of Industrial Cybersecurity 2018” seeks to answer the questions, what do use companies really want? What Are their priorities, and what concerns and challenges do they face? What external and internal factors are impacting industrial cybersecurity? What strategies and measures are being employed, now and in the future?

(more available)
Added: October 22, 2018
image from It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

This paper presents the testimony, of Martin Libicki, presented before the House Armed Services Committee on March 1, 2017.

Added: October 21, 2018
image from Fail To Plan, Plan To Fail

Fail To Plan, Plan To Fail

This paper is the result of a Forrester survey that sought to understand the roles of LoB practitioners and SOCs in securing IoT environments.

(more available)
Added: October 20, 2018
image from Bridging The IoT Perception Gap:Information Vs. Operational Technology

Bridging The IoT Perception Gap:Information Vs. Operational Technology

This report is based on a survey that was conducted to observe the differing views and opinions of IT and OT teams.

(more available)
Added: October 18, 2018
image from GTIC Monthly Threat Report July 2017

GTIC Monthly Threat Report July 2017

This monthly threat report takes a look at the month of July 2017. More specifically, it takes a look at why the GDPR matters, observations from the Cyber Kill Chain, and buffer flow VULNS.

(more available)
Added: October 18, 2018
image from Personalisation Opportunities In Retail Stores Enhancing Customer Experience Through Location-based Analytics

Personalisation Opportunities In Retail Stores Enhancing Customer Experience Through Location-based Analytics

This report takes a look at the future of the retail industry and how an organizations network can assist with customer experience.

(more available)
Added: October 18, 2018
image from A Holistic Approach To Identity Managing For The Internet Of Things

A Holistic Approach To Identity Managing For The Internet Of Things

This whitepaper will introduce this new hierarchy of IoT IdM requirements. It will explain how enterprises and governmental agencies should employ a new generation of Cloud-based IdM solutions that can scale to meet today’s escalating IoT security requirements, and enable organizations to fulfill the promise of today’s connected world.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)