Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Embedded system

Below you will find reports with the tag of “Embedded system”

image from Crossing The Last Mile Of IoT Security Cyber Risk

Crossing The Last Mile Of IoT Security Cyber Risk

This paper seeks to provide understanding and aid with meeting the unique information demands that the Internet of Things requires.
Added: October 23, 2018
image from CENTRI 2017 Security Report Research And Roundtable

CENTRI 2017 Security Report Research And Roundtable

The purpose of this report is to look at some of the key security issues the industry is facing now in terms of what problems exist and possible solutions. (more available)
Added: October 19, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

This paper seeks to provide high level and tactical findings that are intended to help you advance the progress of your own DevOps Journey. (more available)
Added: October 16, 2018
image from A Quick History Of IoT Botnets

A Quick History Of IoT Botnets

Here is a short report on the history of IoT Botnets.
Added: October 16, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). (more available)
Added: October 15, 2018
image from Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

Rooting A Logitech Harmony Hub:Improving Security In Today's IoT World

This blog post takes a look at a vulnerability unique to the Logitech Harmony Hub.
Added: October 13, 2018
© Cyentia Institute 2022
Library updated: June 30, 2022 20:09 UTC (build d6199b1)