Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Hardware inventory

Below you will find reports with the tag of “Hardware inventory”

image from The 2021 Security Outcomes Study

The 2021 Security Outcomes Study

Based on a survey of over 4,800, this report reviews the practices that lead to positive outcomes for security programs. Linking together practices that are more (or less) successful to the characteristics of positive outcomes, this report aims to give guidance for where practitioners can focus their efforts to achieve similar outcomes. (more available)
Added: December 1, 2020
image from Inside the Mind of a Hacker 2020

Inside the Mind of a Hacker 2020

The annual report on the composition and findings of security testing as powered by BugCrowd’s bug bounty platform of nearly 3,500 security testers. (more available)
Added: June 23, 2020
image from Banking on Security

Banking on Security

In this report, we will address the aforementioned questions using data that Forescout Technologies has carefully gathered, tested and validated from all forms of device networks and the applications they support. (more available)
Added: May 8, 2020
image from Prioritization to Prediction: Volume 5

Prioritization to Prediction: Volume 5

P2P Volume 5 focuses on the differences between asset types (OS) and how vulnerabilities are treated on different platforms.
Added: April 21, 2020
image from Vulnerability QuickView Report Q3 2019

Vulnerability QuickView Report Q3 2019

Risk Based Security has been sharing our Vulnerability QuickView reports with the world, providing detailed analysis on the vulnerability landscape based on data from our vulnerability intelligence product, VulnDB . (more available)
Added: November 25, 2019
image from What Security Teams Discover When They Automate Cybersecurity Asset Management

What Security Teams Discover When They Automate Cybersecurity Asset Management

From the report, “After working with hundreds of security professionals and covering over 1 million assets at some of the world’s most innovative brands, the team at Axonius has identified 5 things that security teams discover when they automate cybersecurity asset management. (more available)
Added: July 10, 2019
image from The Role of Cybersecurity In Mergers and Acquisitions Diligence

The Role of Cybersecurity In Mergers and Acquisitions Diligence

This study was designed to examine the growing concern of cyber risks and the importance of cyber assessment during mergers and acquisitions (M&A) and determine how well companies are prepared to deal with cyber risk during M&A from the perspective of IT Decision Makers (ITDMs) and Business Decision Makers (BDMs). (more available)
Added: July 10, 2019
image from Reducing Industrial Risk: 20 Experts Share Strategies For Managing OT Cybersecurity

Reducing Industrial Risk: 20 Experts Share Strategies For Managing OT Cybersecurity

The essays in this eBook provide a wealth of information and present an inside look at an aspect of cybersecurity that is still not well understood. (more available)
Added: March 9, 2019
image from Top Three Use Cases: Automated OT Asset Discovery and Management

Top Three Use Cases: Automated OT Asset Discovery and Management

This report takes an inside look at Industrial Control Systems and the need for them to be updated for the new Cyber Security Threats. (more available)
Added: March 9, 2019
image from 2019 AWS Cloud Security Report

2019 AWS Cloud Security Report

This report has been produced in partnership with the 400,000 member Cybersecurity Insiders community of IT security professionals to explore how AWS user organizations are responding to security threats in the cloud, and what tools and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. (more available)
Added: February 6, 2019
image from Pervasive Automation Report

Pervasive Automation Report

From the report, “Much like DevOps itself, pervasive automation is equal parts process, tooling, and culture. Taking the journey represents a collective commitment by the entire organization, one where the goal is realizing the competitive advantage offered by software automation. (more available)
Added: January 24, 2019
image from How Tanium helps address the CIS Critical Security Controls/SANS Top 20

How Tanium helps address the CIS Critical Security Controls/SANS Top 20

This paper provides a checklist to address CIS Critical Security Controls.
Added: December 29, 2018
image from IT Management on the Brink: Reaching a Breaking Point in Capabilities

IT Management on the Brink: Reaching a Breaking Point in Capabilities

This paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process. (more available)
Added: December 29, 2018
image from SANS 2018 Security Operations Center Survey: The Definition of SOC-cess?

SANS 2018 Security Operations Center Survey: The Definition of SOC-cess?

This report is based on a survey, that is intended to provide a community perspective on what security operations centers (SOCs) look like within organizations across the globe, as well as data and guidance to enable organizations to build, manage, maintain and mature effective and efficient SOCs. (more available)
Added: October 26, 2018
image from Tripwire State Of Cyber Hygiene Report 2018

Tripwire State Of Cyber Hygiene Report 2018

This report illustrates how organizations are implementing proper Cyber hygiene, if at all. To gather this data, Tripwire partnered with Dimensional Research, sending a survey to independent sources of IT security professionals. (more available)
Added: October 22, 2018
image from The Art Of Organizing And Simplifying IT Support

The Art Of Organizing And Simplifying IT Support

Learn easy and effective ways for IT pros to manage help desk tickets and simplify the job of supporting end-users.
Added: October 20, 2018
image from Software Asset Management.Next

Software Asset Management.Next

This paper seeks to help organizations understand the future of Software Asset Management.
Added: October 19, 2018
image from Beginner's Guide To Encryption

Beginner's Guide To Encryption

Device Authority’s Beginners’ Guide to Encryption is designed to help you understand the basics of how encryption works, why it matters, and what challenges are facing encryption in the new landscape of the Internet of Things (IoT). (more available)
Added: October 14, 2018
image from Intent-Based Networking And Extending The Enterprise

Intent-Based Networking And Extending The Enterprise

Cisco provides a brief report that discusses intent based networking and the enterprise.
Added: October 14, 2018
© Cyentia Institute 2021
Library updated: January 18, 2021 20:05 UTC (build 7e736b2)