Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Cyber-physical

Below you will find reports with the tag of “Cyber-physical”

image from Upstream Security's Global Automotive Cybersecurity Report 2020

Upstream Security's Global Automotive Cybersecurity Report 2020

This report highlights research into cyber-attack trends in the smart mobility ecosystem.
Added: July 31, 2020
image from Cybersecurity Trends 2020

Cybersecurity Trends 2020

This annual report outlines expected cybersecurity trends for the coming year.
Added: July 30, 2020
image from Radware DDoS Protection Market Impact Report

Radware DDoS Protection Market Impact Report

This report goes in depth on Radware’s performance in mitigating DDoS attacks.
Added: May 21, 2020
image from Mind the Gap: The Underinsurance of Cyber Risk

Mind the Gap: The Underinsurance of Cyber Risk

Discusses systemic cyber risk, catastrophic losses, and the implications upon cyber insurance policies.
Added: April 24, 2020
image from 2020 RSAS Trend Report

2020 RSAS Trend Report

Each year, industry leaders from around the world submit an application to be a speaker at RSA Conference. This year, we received 2,400 responses to our 2020 Call for Speakers. (more available)
Added: February 7, 2020
image from Commonalities in Vehicle Vulnerabilities

Commonalities in Vehicle Vulnerabilities

This paper is a follow-up to IOActive’s 2016 report1 on vehicle vulnerabilities. The goal of this paper is to revisit the topic using data from the past two years (2016, 2017) and to compare this information to previous findings to analyze how the industry is progressing. (more available)
Added: March 9, 2019
image from Splunk 2018 Predictions

Splunk 2018 Predictions

At Splunk, our experts don’t read palms, but they do look into the future. The future of artificial intelligence (AI) and machine learning (ML), IT operations, security, and IoT. (more available)
Added: February 9, 2019
image from Securing The Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices

Securing The Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices

Synopsys and SAE International partnered to commission this independent survey of the current cybersecurity practices in the automotive industry to fill a gap that has existed far too long—the lack of data needed to understand the automotive industry’s cybersecurity posture and its capability to address software security risks inherent in connected, software-enabled vehicles. (more available)
Added: February 8, 2019
image from What The Internet Of Things Means For Consumer Privacy

What The Internet Of Things Means For Consumer Privacy

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies. (more available)
Added: November 24, 2018
image from IoT Consumer Confidence Report

IoT Consumer Confidence Report

Our expectations of technology are skyrocketing. Where once a consumer might accept that a web page or system might load slowly, now they expect an instant and perfect experience. (more available)
Added: November 23, 2018
image from The Machine Identity Crisis

The Machine Identity Crisis

“The use of machines is driving unprecedented improvements in business efficiency, productivity, agility and speed. With businesses increasing their reliance on machines, the number of machines on enterprise networks is growing exponentially. (more available)
Added: November 6, 2018
image from Securing Smart Cities:Moving Toward Utopia With Security In Mind

Securing Smart Cities:Moving Toward Utopia With Security In Mind

This paper surveys some of the existing smart technologies currently used in smart cities worldwide. Much like our previous reports on exposed smart devices and the hacking of robots in smart factories, this paper will discuss the risks of using smart technologies in critical sectors and will provide actionable steps to help local governments and urban developers design more secure smart cities. (more available)
Added: October 26, 2018
image from 5G Security Architecture White Paper

5G Security Architecture White Paper

From the report, “We are now seeing the first incarnations of 5G technology. It provides many capabilities that make it a preferred platform for the digitalized world. (more available)
Added: October 22, 2018
image from Key Technologies Needed To Advance Mission Critical IoT

Key Technologies Needed To Advance Mission Critical IoT

This white paper outlines the key challenges you face across the 3 layers of the IoT ecosystem—device, wireless communications, and network and system—and details the technologies you need to overcome them and realize success in the mission-critical IoT. (more available)
Added: October 19, 2018
image from Transformational ‘smart cities’: cyber security and resilience

Transformational ‘smart cities’: cyber security and resilience

This report will explore the requirements and challenges of creating a secure, reliable and resilient smart city. It will consider how administrations and the overall city ecosystems will need to provide innovative, resilient ‘smart’ solutions that leverage digital information while protecting against malicious violations, unintentional damage and natural disasters. (more available)
Added: October 19, 2018
image from Bridging The IoT Perception Gap:Information Vs. Operational Technology

Bridging The IoT Perception Gap:Information Vs. Operational Technology

This report is based on a survey that was conducted to observe the differing views and opinions of IT and OT teams. (more available)
Added: October 18, 2018
image from Cyberattacks Against Intelligent Transportation Systems

Cyberattacks Against Intelligent Transportation Systems

There is currently very little published research discussing the cybersecurity threats against ITS. In this paper, we first explored real-world ITS cyberattacks and their impact. (more available)
Added: October 15, 2018
image from Security Response: Insecurity in the Internet of Things

Security Response: Insecurity in the Internet of Things

The Internet of Things is becoming and area of danger for security risks. This paper discusses the cyber security issues related to the internet of things, and discusses how people should be taking action to protect their devices. (more available)
Added: October 15, 2018
image from A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

This special report brought to you by the folks at Symantec, takes a hard look at the security issues that surround smart speakers. (more available)
Added: October 14, 2018
image from Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

This blog post takes a look at a vulnerability unique to the Logitech Harmony Hub.
Added: October 13, 2018
image from The Dangers Of Smart City Hacking

The Dangers Of Smart City Hacking

This paper offers insight into smart cities and the dangers of exposed devices on the network.
Added: October 12, 2018
© Cyentia Institute 2021
Library updated: February 27, 2021 00:06 UTC (build 7e736b2)