Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Productivity software

Below you will find reports with the tag of “Productivity software”

image from Flexera 2022 State of ITAM Report

Flexera 2022 State of ITAM Report

The report evaluates the responses of 465 global IT professionals who manage, advise, and participate in ITAM, SAM, and HAM activities in organizations of 1,000 or more employees. (more available)
Added: February 11, 2022
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. (more available)
Added: December 10, 2021
image from Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams

Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams

This is a report based on a 2020 survey of remote workers. It emphasizes the disconnect between the company and the worker associated with remote work. (more available)
Added: October 7, 2020
image from The Path from Reactive to Proactive Third-Party Risk Management

The Path from Reactive to Proactive Third-Party Risk Management

Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns. (more available)
Added: June 22, 2020
image from Are You Trading Stocks Securely?

Are You Trading Stocks Securely?

This paper demonstrates vulnerabilities that affect numerous traders. Among them are unencrypted authentication, communications, passwords, and trading data; remote DoS that leaves applications useless; trading programming languages that allow DLL imports; insecurely implemented chatbots; weak password policies; hardcoded secrets; and poor session management. (more available)
Added: March 9, 2019
image from Top Three Use Cases: Automated OT Asset Discovery and Management

Top Three Use Cases: Automated OT Asset Discovery and Management

This report takes an inside look at Industrial Control Systems and the need for them to be updated for the new Cyber Security Threats. (more available)
Added: March 9, 2019
image from DevSecOps Community Survey 2018

DevSecOps Community Survey 2018

This survey, representing the voice of 2,076 IT professionals, demonstrates that DevSecOps practices continue to mature rapidly and that, once automated, security is difficult to ignore. (more available)
Added: January 15, 2019
image from High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows. (more available)
Added: November 24, 2018
image from Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

During our monitoring of activities around the APT28 threat group, McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research. (more available)
Added: November 15, 2018
image from Operation Wilted Tulip

Operation Wilted Tulip

CopyKittens is a cyberespionage group that has been operating since at least 2013. In November 2015, ClearSky and Minerva Labs published1 the first public report exposing its activity. (more available)
Added: November 15, 2018
image from Threat Advisory: Tiscali App

Threat Advisory: Tiscali App

This is a threat advisory for the Tiscali App.
Added: October 23, 2018
image from Combating Web Scraping In Online Businesses

Combating Web Scraping In Online Businesses

This report takes a look at the harmful practice of web scraping.
Added: October 20, 2018
image from 2016 Cyber Weapons Report

2016 Cyber Weapons Report

A Bulleton recapping headlines and stores in the Global Insurance and Regulatory industry.
Added: October 17, 2018
image from Executive Briefing Series: Mobile Cyber Security

Executive Briefing Series: Mobile Cyber Security

This is a brief introduction to Mobile Cyber Security
Added: October 16, 2018
© Cyentia Institute 2022
Library updated: June 30, 2022 20:09 UTC (build d6199b1)