Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Credentials

Below you will find reports with the tag of “Credentials”

image from 2017 Breach Predictions Report

2017 Breach Predictions Report

Through analysis of public breach data, a useful picture of the threat landscape can be observed. Analyzing trends, it may be possible to predict the general scale of expected breaches in the near future and frame those impacts in a meaningful way for individuals. This will hopefully serve to highlight the importance of good security practices and bring attention to the “personal supply chain” problem – that the companies where individuals maintain accounts and trust with personal information are part of the attack surface they create for themselves and the risk of such behavior needs to be weighed against the benefits gained.

(more available)
Added: October 12, 2018
image from A Priviliged Account Security Approach To GDPR Readiness

A Priviliged Account Security Approach To GDPR Readiness

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 12, 2018
image from A Technical Solutions Guide For Privileged Password And Session Management Use Cases

A Technical Solutions Guide For Privileged Password And Session Management Use Cases

Despite the number of data breach stories in the news, many IT organizations fall into the easy trap of using shared accounts for users, administrators, or applications. While this practice means that, when access is needed, everyone can easily pitch in to get the work done, it comes with massive, unjustifiable security and compliance tradeoffs. This paper seeks to provide assistance with these situations.

(more available)
Added: October 12, 2018
image from GDPR Headlines

GDPR Headlines

Centrify has worked with the specialist law firm, Cordery, to develop this headline summary of when the GDPR applies, the key impacts and what you need to do to comply with the GDPR.

(more available)
Added: October 12, 2018
image from IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions widespread, trusted identity exchanges using federated methods that are secure, interoperable, privacy-enhancing and easy to use. Realization of that vision will require companies, agencies and individuals to perform at a new level. The Requirements are our first step towards that goal, by describing a set of functions that parties must be able to fulfill, and a set of criteria for assessing those capabilities.

(more available)
Added: October 12, 2018
image from M-Trends 2015

M-Trends 2015

Mandiant consultants’ role as the first responders to critical security incidents gives them a unique vantage point into how attackers’ motives and tactics are changing . The insights and analysis presented here represent their combined experience over the course of hundreds of service engagements . Over the last decade, they have helped clients across more than 30 industries around the globe .

(more available)
Added: October 12, 2018
image from Producing Your Network Security Policy

Producing Your Network Security Policy

This paper is designed to help you put together your organization’s network security policy.

Added: October 12, 2018
image from Securing Hybrid Cloud Environments And Workloads On Amazon Web Services (AWS)

Securing Hybrid Cloud Environments And Workloads On Amazon Web Services (AWS)

The goal of this report is to help organizations that have both onsite and cloud based assests.

Added: October 12, 2018
image from Security Healthcare Information Security Guide

Security Healthcare Information Security Guide

This report provides a collection of articles on Healthcare Security.

Added: October 12, 2018
image from The Dangers Of Smart City Hacking

The Dangers Of Smart City Hacking

This paper offers insight into smart cities and the dangers of exposed devices on the network.

Added: October 12, 2018
  • ««
  • «
  • 25
  • 26
  • 27
  • 28
  • 29
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 16:09 UTC (build b1d7be4)