Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Control Systems

Below you will find reports with the tag of “Control Systems”

image from Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

This paper discusses the security issues related to biometric facial recognition applications.

Added: October 17, 2018
image from Threat Landscape Report Q3 2017

Threat Landscape Report Q3 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 17, 2018
image from What About The Plant Floor: Six Subversive Concerns For Industrial Environments

What About The Plant Floor: Six Subversive Concerns For Industrial Environments

This paper describes six key weaknesses that an adversary can use to undermine a plant’s operation, providing real-life threat details and mitigation options.

(more available)
Added: October 17, 2018
image from Automotive And Industrial Ethernet: Moving Beyond Standards Validation To System Level Testing

Automotive And Industrial Ethernet: Moving Beyond Standards Validation To System Level Testing

In this paper, they look at examples in both automotive and industrial networks that highlight the need for more comprehensive testing and introduce an effective validation solution. Topics include Ethernet-CAN/Flexray coexistence, automotive protocols including SOME/IP, ADAS, time-aware shaping including IEEE 802.1Qbv, stream reservation including IEEE 802.1Qav, and testing time synchronization (IEEE 802.1AS), AVB standards (IEEE 802.1Qat, IEEE 802.1Qav), and TSN standards (like IEEE 802.1Qbv, IEEE 802.1Qci, IEEE 802.1CB).

(more available)
Added: October 16, 2018
image from Energy Market Review 2014

Energy Market Review 2014

This report seeks to understand, and analyze, whether or not the energy market can respond to a damaging cyber attack.

(more available)
Added: October 16, 2018
image from Integrated Infrastructure: Cyber Resiliency in Society, Mapping the Consequences of an Interconnected Digital Economy;

Integrated Infrastructure: Cyber Resiliency in Society, Mapping the Consequences of an Interconnected Digital Economy;

A very detailed report that discusses the dangers of cyber threats to infrastructure and large systems that impact all of society.

(more available)
Added: October 16, 2018
image from UK 2015 Cyber Risk Survey Report

UK 2015 Cyber Risk Survey Report

This is an in-depth study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. The benchmarking data in this report was collected from risk professionals and CFOs from large and medium-sized corporations from across the UK. It is the hope that the aggregated information will provide useful benchmarking data and reference points against which the reader can compare their own company’s positions.

(more available)
Added: October 16, 2018
image from Always On. Always Up.

Always On. Always Up.

This white paper is geared towards the energy industry and learning about how network security can help maintain cybersecurity protections specifically in that industry.

(more available)
Added: October 15, 2018
image from Threat Landscape Report Q1 2018

Threat Landscape Report Q1 2018

This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On!

(more available)
Added: October 15, 2018
image from The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

In this ebook, they examine a specific cyber attack on a Ukrainian utility company in detail, and identify common steps that are used time and again during advanced attacks.

(more available)
Added: October 14, 2018
image from The Main Pillars Of The DevOps Toolchain

The Main Pillars Of The DevOps Toolchain

This paper discusses DevOps and the security issues related to DevOps.

Added: October 14, 2018
image from Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience.

(more available)
Added: October 13, 2018
image from Controlling Lateral Movement In Unix And Linux Environments

Controlling Lateral Movement In Unix And Linux Environments

This technical brief will describe how you can use PowerBroker for Unix & Linux in your *NIX server environment to address and enforce the NIST requirements, as well as the principles of a mature system access model to limit or prevent lateral movement within your environment. These principles apply to identity management, access control, and server configuration and monitoring, operating as a triad to support a strong security program.

(more available)
Added: October 13, 2018
image from Cyber Attacks: Power Failure Implications

Cyber Attacks: Power Failure Implications

A paper discussing the impact of a cyber attack on the power grid.

Added: October 13, 2018
image from Industry 4.0: The World Of Making Is Changing

Industry 4.0: The World Of Making Is Changing

This well designed Report provides excellent articles and insight into the growth of devices and Cyber Security.

Added: October 13, 2018
image from Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

This blog post takes a look at a vulnerability unique to the Logitech Harmony Hub.

Added: October 13, 2018
image from Cybersecurity Challenges in Aviation

Cybersecurity Challenges in Aviation

This paper discusses the issues and challenges involved in maintaining good cybersecurity in the field of aviation.

Added: October 12, 2018
image from The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report highlights notable threats, incidents and trends observed during the previous year.

Added: October 12, 2018
image from US Cyber Market Update: 2017 US Cyber Insurance Profits And Performance

US Cyber Market Update: 2017 US Cyber Insurance Profits And Performance

The aim of this report is to provide insights for insurers that currently offer cyber insurance, as well as those seeking to offer it, to provide a performance benchmark, and to give perspective on the industry experience.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)