Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams
This is a report based on a 2020 survey of remote workers. It emphasizes the disconnect between the company and the worker associated with remote work. (more available)
The Path from Reactive to Proactive Third-Party Risk Management
Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns. (more available)
Are You Trading Stocks Securely?
This paper demonstrates vulnerabilities that affect numerous traders. Among them are unencrypted authentication, communications, passwords, and trading data; remote DoS that leaves applications useless; trading programming languages that allow DLL imports; insecurely implemented chatbots; weak password policies; hardcoded secrets; and poor session management. (more available)
Top Three Use Cases: Automated OT Asset Discovery and Management
This report takes an inside look at Industrial Control Systems and the need for them to be updated for the new Cyber Security Threats. (more available)
DevSecOps Community Survey 2018
This survey, representing the voice of 2,076 IT professionals, demonstrates that DevSecOps practices continue to mature rapidly and that, once automated, security is difficult to ignore. (more available)
High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities
Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows. (more available)
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
During our monitoring of activities around the APT28 threat group, McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research. (more available)
Operation Wilted Tulip
CopyKittens is a cyberespionage group that has been operating since at least 2013. In November 2015, ClearSky and Minerva Labs published1 the first public report exposing its activity. (more available)
Combating Web Scraping In Online Businesses
This report takes a look at the harmful practice of web scraping.
2016 Cyber Weapons Report
A Bulleton recapping headlines and stores in the Global Insurance and Regulatory industry.