Below you will find reports with the tag of “Productivity software” Flexera 2022 State of ITAM Report The report evaluates the responses of 465 global IT professionals who manage, advise, and participate in ITAM, SAM, and HAM activities in organizations of 1,000 or more employees. (more available) Added: February 11, 2022 2021 Cloud Application Security As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. (more available) Added: December 10, 2021 Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams This is a report based on a 2020 survey of remote workers. It emphasizes the disconnect between the company and the worker associated with remote work. (more available) Added: October 7, 2020 The Path from Reactive to Proactive Third-Party Risk Management Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns. (more available) Added: June 22, 2020 Are You Trading Stocks Securely? This paper demonstrates vulnerabilities that affect numerous traders. Among them are unencrypted authentication, communications, passwords, and trading data; remote DoS that leaves applications useless; trading programming languages that allow DLL imports; insecurely implemented chatbots; weak password policies; hardcoded secrets; and poor session management. (more available) Added: March 9, 2019 Top Three Use Cases: Automated OT Asset Discovery and Management This report takes an inside look at Industrial Control Systems and the need for them to be updated for the new Cyber Security Threats. (more available) Added: March 9, 2019 DevSecOps Community Survey 2018 This survey, representing the voice of 2,076 IT professionals, demonstrates that DevSecOps practices continue to mature rapidly and that, once automated, security is difficult to ignore. (more available) Added: January 15, 2019 High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows. (more available) Added: November 24, 2018 Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack During our monitoring of activities around the APT28 threat group, McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research. (more available) Added: November 15, 2018 Operation Wilted Tulip CopyKittens is a cyberespionage group that has been operating since at least 2013. In November 2015, ClearSky and Minerva Labs published1 the first public report exposing its activity. (more available) Added: November 15, 2018 Threat Advisory: Tiscali App This is a threat advisory for the Tiscali App. Added: October 23, 2018 Combating Web Scraping In Online Businesses This report takes a look at the harmful practice of web scraping. Added: October 20, 2018 2016 Cyber Weapons Report A Bulleton recapping headlines and stores in the Global Insurance and Regulatory industry. Added: October 17, 2018 Executive Briefing Series: Mobile Cyber Security This is a brief introduction to Mobile Cyber Security Added: October 16, 2018
Flexera 2022 State of ITAM Report The report evaluates the responses of 465 global IT professionals who manage, advise, and participate in ITAM, SAM, and HAM activities in organizations of 1,000 or more employees. (more available) Added: February 11, 2022
2021 Cloud Application Security As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. (more available) Added: December 10, 2021
Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams This is a report based on a 2020 survey of remote workers. It emphasizes the disconnect between the company and the worker associated with remote work. (more available) Added: October 7, 2020
The Path from Reactive to Proactive Third-Party Risk Management Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns. (more available) Added: June 22, 2020
Are You Trading Stocks Securely? This paper demonstrates vulnerabilities that affect numerous traders. Among them are unencrypted authentication, communications, passwords, and trading data; remote DoS that leaves applications useless; trading programming languages that allow DLL imports; insecurely implemented chatbots; weak password policies; hardcoded secrets; and poor session management. (more available) Added: March 9, 2019
Top Three Use Cases: Automated OT Asset Discovery and Management This report takes an inside look at Industrial Control Systems and the need for them to be updated for the new Cyber Security Threats. (more available) Added: March 9, 2019
DevSecOps Community Survey 2018 This survey, representing the voice of 2,076 IT professionals, demonstrates that DevSecOps practices continue to mature rapidly and that, once automated, security is difficult to ignore. (more available) Added: January 15, 2019
High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows. (more available) Added: November 24, 2018
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack During our monitoring of activities around the APT28 threat group, McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research. (more available) Added: November 15, 2018
Operation Wilted Tulip CopyKittens is a cyberespionage group that has been operating since at least 2013. In November 2015, ClearSky and Minerva Labs published1 the first public report exposing its activity. (more available) Added: November 15, 2018
Combating Web Scraping In Online Businesses This report takes a look at the harmful practice of web scraping. Added: October 20, 2018
2016 Cyber Weapons Report A Bulleton recapping headlines and stores in the Global Insurance and Regulatory industry. Added: October 17, 2018
Executive Briefing Series: Mobile Cyber Security This is a brief introduction to Mobile Cyber Security Added: October 16, 2018