Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Network Configuration

Below you will find reports with the tag of “Network Configuration”

image from EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

This report uniquely addresses SecOps initiatives in terms of role, team leadership, success rates, company size, vertical adoptions, and geography. It provides telling insights into technology priorities, process, and best practices and metrics for critical use cases—including integrated security/ compliance for performance and availability management, change and configuration management, and IT asset management and audits. The report also addresses how cloud, agile, digital transformation, and mobile all impact SecOps directions.

(more available)
Added: October 23, 2018
image from The ROPEMAKER Email Exploit

The ROPEMAKER Email Exploit

This threat advisory offers insight into the ROPEMAKER Email Exploit.

Added: October 23, 2018
image from Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey

Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey

This is a brief playbook that gives a plan for how to get started with cloud security.

Added: October 22, 2018
image from Tripwire State Of Cyber Hygiene Report 2018

Tripwire State Of Cyber Hygiene Report 2018

This report illustrates how organizations are implementing proper Cyber hygiene, if at all. To gather this data, Tripwire partnered with Dimensional Research, sending a survey to independent sources of IT security professionals. The survey was completed by 306 participants in July 2018, all of whom are responsible for IT security at companies with more than 100 employees.

(more available)
Added: October 22, 2018
image from Bridging The Gap Between Secops Intent And Reality

Bridging The Gap Between Secops Intent And Reality

This report is based on a survey conducted from a variety of groups with regards to Secops and why are there is a gap between what it intends to do and the reality of what it is.

(more available)
Added: October 20, 2018
image from 2018 State Of DevOps Report

2018 State Of DevOps Report

The 2018 State of DevOps Report breaks new ground in an understanding of the DevOps evolutionary journey. They have identified the five distinct stages of DevOps evolution, and the critical practices at each stage that help you achieve success and progress to the next phase of your journey.

(more available)
Added: October 17, 2018
image from RightScale 2018 State Of The Cloud Report

RightScale 2018 State Of The Cloud Report

In January 2018, RightScale conducted its annual State of the Cloud Survey. The survey questioned technical professionals across a broad cross-section of organizations about their adoption of cloud infrastructure. The 997 respondents range from technical executives to managers and practitioners and represent organizations of varying sizes across many industries. Respondents represent companies across the cloud spectrum, including both users (19 percent) and non-users (81 percent) of RightScale solutions. Their answers provide a comprehensive perspective on the state of the cloud today.

(more available)
Added: October 17, 2018
image from 2016 State Of The Cloud Report

2016 State Of The Cloud Report

In January 2016, RightScale surveyed 1,060 technical professionals across a broad cross-section of organizations about their adoption of cloud computing. This report is based on those findings.

(more available)
Added: October 16, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

This paper seeks to provide high level and tactical findings that are intended to help you advance the progress of your own DevOps Journey. Some key findings in this report are; the beneficial effects of DevOps go beyond financial results, automation is a key differentiator for organizations, and they delve deep into how an application’s architecture can affect an organization’s ability to develop and deliver software.

(more available)
Added: October 16, 2018
image from The Definitive Guide To Micro Segmentation

The Definitive Guide To Micro Segmentation

This eBook gives a detailed understanding of Adaptive segmentation and how it can be effectively used for cloud security.

Added: October 14, 2018
image from The Main Pillars Of The DevOps Toolchain

The Main Pillars Of The DevOps Toolchain

This paper discusses DevOps and the security issues related to DevOps.

Added: October 14, 2018
image from Using Network Analytics To Detect PowerShell Attacks

Using Network Analytics To Detect PowerShell Attacks

This report provides an analysis of Microsoft’s PowerShell language and how it has been used by cybercriminals.

Added: October 14, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)