Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Metrics

Below you will find reports with the tag of “Metrics”

image from Federal Information Security Modernization Act Report to Congress

Federal Information Security Modernization Act Report to Congress

The President of the United States’ Office of Management and Budget, prepared this report. This report covers the period from October 1, 2014, through September 30, 2015, and provides an update of ongoing information security initiatives, a review of Fiscal Year 2015 information security incidents, Inspector General assessments of agencies’ progress in implementing information security capabilities, and the Federal Government’s progress in meeting key information security performance measures based on agency submitted data.

(more available)
Added: October 15, 2018
image from Threat Advisory: iCare Leak

Threat Advisory: iCare Leak

This is a threat advisory for iCare Leak

Added: October 15, 2018
image from 2017 North America Online Fraud Benchamark Report

2017 North America Online Fraud Benchamark Report

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 14, 2018
image from Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

In this paper, they explore the underlying challenges with regard to Cyber Risk management and analyze the nature of increasingly stringent regulatory demands. Putting these pieces together, they frame five strategic moves which they believe will enable business needs, their fiduciary responsibilities with regard to Cyber Risk, and regulatory requirements.

(more available)
Added: October 14, 2018
image from Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

This blog post discusses the point that organizations need to assess cybersecurity as a business enabler, rather than a hindrance.

(more available)
Added: October 14, 2018
image from Mobile Integration Done Right

Mobile Integration Done Right

This paper takes a look at mobile app integration and presents how to do it correctly.

Added: October 14, 2018
image from Annual Fraud Benchmarking Report:

Annual Fraud Benchmarking Report:

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 13, 2018
image from CEO Survey:Summary And Key Findings

CEO Survey:Summary And Key Findings

RedSeal polled 200 CEO’s about their confidence in their companies’ cybersecurity posture, and discovered that they are dangerously unrealistic about how vulnerable they are.

(more available)
Added: October 13, 2018
image from Using Security Metrics to Drive Action

Using Security Metrics to Drive Action

An Annual Showcase of Data Breaches.

Added: October 13, 2018
image from 2018 Vulnerability Statistcs Report

2018 Vulnerability Statistcs Report

This Report provides key takeaways from the vulnerability issues of 2017.

Added: October 12, 2018
image from Cyber Power Potential Of The Army's Reserve Component

Cyber Power Potential Of The Army's Reserve Component

This report documents research conducted as part of a study entitled “Managing and Developing Reserve Component Capabilities in Sup- port of the Army’s Cyber Force.” The primary purpose of the study was to conduct initial research on how to train, manage, and develop the Army’s cyber force, with a specific focus on the Army National Guard and the U.S. Army Reserve.

(more available)
Added: October 12, 2018
image from Validating The New World Of 400 Gigabit Ethernet: The Return Of Industry Benchmarking

Validating The New World Of 400 Gigabit Ethernet: The Return Of Industry Benchmarking

Read this white paper to understand why this is a critical time to renew efforts to compare and benchmark the performance of these new network products and devices.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)