Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Controlled Access

Below you will find reports with the tag of “Controlled Access”

image from The State of Segmentation 2023

The State of Segmentation 2023

As the findings in this report show, these attacks are also having a greater impact, adding to pressure on security leaders to choose the right solutions and keep the entire environment safe, without sacrificing overall performance or innovation. The 1,200 respondents agreed overwhelmingly on the effectiveness of segmentation in keeping assets protected, but their overall progress in deploying it around critical business applications and assets was lower than expected.

(more available)
Added: November 6, 2023
image from The Necessity of Cyber Risk Quantification

The Necessity of Cyber Risk Quantification

Executives clearly recognize the danger. Almost three-quarters (74%) of 168 executives recently surveyed by Harvard Business Review Analytic Services regard cyber risk as one of the top-three risks their company faces today, and 67% predict it will be a top three risk two years for now. Only half of respondents, however, say they are successful or very successful at generating insights and enabling informed decisions on cyber risk and at anticipating, preparing for, and responding to future cyber incidents.

(more available)
Added: May 11, 2023
image from Cisco 2023 Data Privacy Benchmark Study

Cisco 2023 Data Privacy Benchmark Study

The data in this study is derived from the Cisco Security Outcomes survey in which respondents were anonymous to the researchers and not informed who was conducting the study. Using the same methodology as prior years, more than 4700 security professionals from 26 geographies completed the survey in Summer 2022. Survey respondents represent major industries and a mix of company sizes.

(more available)
Added: April 25, 2023
image from 2021 Identity and Access Management Report

2021 Identity and Access Management Report

The 2021 Identity and Access Management Report reveals the increasing importance of managing access as part of an organization’s overall risk management and security posture in the new normal of hybrid work locations. The report highlights what is and what is not working for security operations teams in securing access to sensitive data, systems, and applications.

(more available)
Added: October 18, 2022
image from DDoS Threat Report 2020 Q3

DDoS Threat Report 2020 Q3

In this edition of our quarterly report, there will be a special feature story that focuses on the DDoS issues surrounding the online gaming industry, in particular, why it is an industry to keep an eye on - especially the service providers to this industry. And why the popularity of online gaming has skyrocketed in Q3.

(more available)
Added: October 11, 2022
image from The state of industrial security in 2022

The state of industrial security in 2022

This report takes an in-depth look at lloT/OT security projects, implementation challenges, security incidents, technology investments, and a variety of issues related to cybersecurity risks.

(more available)
Added: July 12, 2022
image from Taking control of security operations

Taking control of security operations

The threat landscape is constantly evolving- and the tools you used to protect your business yesterday certainly won’t keep you safe tomorrow. In this white paper, you’ll learn three ways an intelligent, integrated approach can streamline your security operations.

(more available)
Added: June 30, 2022
image from Cisco Global Hybrid Work Study 2022

Cisco Global Hybrid Work Study 2022

This research aimed to uncover insights into how employees have fared over the past two years, where hybrid and remote working has been commonplace. It reveals the significant benefits that hybrid working has brought to both employees and employers, despite the challenges anticipated at the start of the pandemic.

(more available)
Added: May 31, 2022
image from Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

This sixth volume of the Prioritization to Prediction series combines vulnerability data from Kenna’s customers with additional intelligence from Fortinet and others. This volume provides a quantitative analysis of the timeline of key dates in the lifecycle of an exploited vulnerability, exploring the effects of releasing exploit code relative to the date of CVE publication and patch availability, discussing the ramifications to attackers and defenders.

(more available)
Added: November 18, 2020
image from Connected Medical Device Security: A Deep Dive into Healthcare Networks

Connected Medical Device Security: A Deep Dive into Healthcare Networks

This report analyzes the security of healthcare delivery organizations. It looks at the risks the industry faces and provides effective strategies to reduce cybersecurity risks and defend healthcare networks.

(more available)
Added: October 30, 2020
image from Redesigning Tech Conferences With Women in Mind

Redesigning Tech Conferences With Women in Mind

This report is based of a survey done in December 2019. It discusses changes they hope to make in tech conferences.

(more available)
Added: September 1, 2020
image from Identity and Access Management Report

Identity and Access Management Report

A review of community members opinions on their prioritization for identity access management systems, the challenges implementing these solutions, and the desired capabilities when selecting IAM technologies.

(more available)
Added: July 27, 2020
image from Cybersecurity Insights Volume 9: Security at the Speed of 5G

Cybersecurity Insights Volume 9: Security at the Speed of 5G

A survey-based report covering 704 cybersecurity professionals from organization with more than 500 employees. This edition has a special focus on the impact of 5G technologies for security professionals.

(more available)
Added: June 12, 2020
image from Why consumers don’t understand card fraud…

Why consumers don’t understand card fraud…

To understand how consumers felt about card fraud against this changing landscape, we surveyed 4,000 consumers across the U.S. and the U.K. (on February 16 and 17, using Propeller Insights) to get a sense of how impacted they’d been, how concerned they were, and how they wanted their banks, financial services, providers and card issuers to respond to this growing threat.

(more available)
Added: May 11, 2020
image from The 2020 Third-Party Risk Management Study

The 2020 Third-Party Risk Management Study

The goal of the study was to provide a state-of-the-market on third-party risk with actionable recommendations that organizations can take to grow and mature their programs.

(more available)
Added: May 8, 2020
image from Banking on Security

Banking on Security

In this report, we will address the aforementioned questions using data that Forescout Technologies has carefully gathered, tested and validated from all forms of device networks and the applications they support. This report presents data from a cross-sectional analysis of the Forescout Device Cloud, which is a repository of host and network information for more than 11 million devices (provided anonymously by Forescout customers). With Forescout Device Cloud, we analyze device fingerprints to identify device function, vendor/model, operating system and version to provide granular auto-classification for a wide range of devices. For this study, researchers limited Device Cloud analysis to 100 large financial services deployments with over 8,500 virtual local area networks (VLANs) and nearly 900,000 devices.

(more available)
Added: May 8, 2020
image from 2019 Year in Review: Lessons Learned from the Front Lines of ICS Cybersecurity

2019 Year in Review: Lessons Learned from the Front Lines of ICS Cybersecurity

This report - compiled from the engagements performed throughout 2019 in customer environments by our threat hunting, penetration testing, incident response, tabletop exercise, and assessments teams

(more available)
Added: March 1, 2020
image from Predictive Prioritization: Data Science Lets You Focus On the 3% Of Vulnerabilities Likely To Be Exploited

Predictive Prioritization: Data Science Lets You Focus On the 3% Of Vulnerabilities Likely To Be Exploited

This technical whitepaper explains the challenges cybersecurity professionals face, how they’re prioritizing vulnerabilities today and how they can dramatically improve cyber risk management with Predictive Prioritization – the process of re-prioritizing vulnerabilities based on the probability that they will be leveraged in an attack.

(more available)
Added: July 10, 2019
image from Management Alert - FEMA Did Not Safeguard Disaster Survivors' Sensitive Personally Identifiable Information (REDACTED)

Management Alert - FEMA Did Not Safeguard Disaster Survivors' Sensitive Personally Identifiable Information (REDACTED)

This alert contains two recommendations directing actions Federal Emergency Management Agency (FEMA) should take to safeguard both Personally Identifiable Information (PII) and Sensitive Personally Identifiable Information (SPII) of disaster survivors and prevent additional privacy incidents similar to one we identified during our ongoing audit of FEMA’s Transitional Sheltering Assistance (TSA) program. FEMA concurred with both recommendations.

(more available)
Added: March 26, 2019
image from Devopsifying Network Security

Devopsifying Network Security

From the report, “This technical whitepaper presents and discusses the concept of “Connectivity as Code”, a complementary concept to “Infrastructure as Code” (IaC), and we will explain how it can be incorporated into the DevOps lifecycle for a more agile application delivery. We will also describe how empowering the developer to define the application’s connectivity requirements will bridge the gap between developers and network security, and help to automate the application delivery process end-to-end. The solution presented in this whitepaper seamlessly weaves network connectivity into the DevOps methodology, while ensuring continuous compliance, so that automation does not compromise security.”

(more available)
Added: February 17, 2019
image from Profile of A Fraudster

Profile of A Fraudster

This report offers insight into 6 different fraud profiles in the online world.

Added: February 13, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)