Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Productivity Software

Below you will find reports with the tag of “Productivity Software”

image from 2023 State of ITAM Report

2023 State of ITAM Report

High-functioning enterprises increasingly rely on ITAM practitioners to tackle new and evolving challenges. Saving money has increasingly become ITAM teams’ number one initiative, but new responsibilities don’t end there. FinOps teams, central cloud teams, security teams, ESG (environmental, social and governance) teams, ITSM teams and enterprise architecture teams are improving their business outcomes by leveraging data from ITAM teams and tools. This year’s survey is weighted more heavily toward larger companies, with 89% of respondents in organizations with more than 2,000 employees and 14% in organizations with more than 50,000 employees.

(more available)
Added: June 14, 2024
image from Flexera 2022 State of ITAM Report

Flexera 2022 State of ITAM Report

The report evaluates the responses of 465 global IT professionals who manage, advise, and participate in ITAM, SAM, and HAM activities in organizations of 1,000 or more employees. The insights gleaned from these responses provide vision into the strategic initiatives across these ITAM practices and practitioners.

(more available)
Added: February 11, 2022
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. But they also deliver significant risk, with Remote Desktop Protocol (RDP) alone serving as the vehicle of choice for as much as 55% of ransomware attacks. This report explores how cloud-based apps – from storage services to social media apps – threaten your network security.

(more available)
Added: December 10, 2021
image from Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams

Survey: IT Remains Blind to Millions as a Quarter of Remote Workers Would Rather Suffer in Silence than Engage Tech Teams

This is a report based on a 2020 survey of remote workers. It emphasizes the disconnect between the company and the worker associated with remote work.

(more available)
Added: October 7, 2020
image from The Path from Reactive to Proactive Third-Party Risk Management

The Path from Reactive to Proactive Third-Party Risk Management

Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns.

(more available)
Added: June 22, 2020
image from Are You Trading Stocks Securely?

Are You Trading Stocks Securely?

This paper demonstrates vulnerabilities that affect numerous traders. Among them are unencrypted authentication, communications, passwords, and trading data; remote DoS that leaves applications useless; trading programming languages that allow DLL imports; insecurely implemented chatbots; weak password policies; hardcoded secrets; and poor session management. In addition, many applications lack countermeasures, such as SSL certificate validation and root detection in mobile apps, privacy mode to mask sensitive values, and anti-exploitation and antireversing mitigations.

(more available)
Added: March 9, 2019
image from Top Three Use Cases: Automated OT Asset Discovery and Management

Top Three Use Cases: Automated OT Asset Discovery and Management

This report takes an inside look at Industrial Control Systems and the need for them to be updated for the new Cyber Security Threats.

(more available)
Added: March 9, 2019
image from DevSecOps Community Survey 2018

DevSecOps Community Survey 2018

This survey, representing the voice of 2,076 IT professionals, demonstrates that DevSecOps practices continue to mature rapidly and that, once automated, security is difficult to ignore.

(more available)
Added: January 15, 2019
image from High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows.

(more available)
Added: November 24, 2018
image from Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

During our monitoring of activities around the APT28 threat group, McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research. This document likely marks the first observed use of this technique by APT28. The use of DDE with PowerShell allows an attacker to execute arbitrary code on a victim’s system regardless whether macros are enabled. (McAfee product detection is covered in the Indicators of Compromise section at the end of the document.)

(more available)
Added: November 15, 2018
image from Operation Wilted Tulip

Operation Wilted Tulip

CopyKittens is a cyberespionage group that has been operating since at least 2013. In November 2015, ClearSky and Minerva Labs published1 the first public report exposing its activity. In March 2017, ClearSky published a second report2 exposing further incidents, some of which impacted the German Bundestag. In this report, Trend Micro and ClearSky expose a vast espionage apparatus spanning the entire time the group has been active. It includes recent incidents as well as older ones that have not been publicly reported; new malware; exploitation, delivery and command and control infrastructure; and the group’s modus operandi. We dubbed this activity Operation Wilted Tulip

(more available)
Added: November 15, 2018
image from Threat Advisory: Tiscali App

Threat Advisory: Tiscali App

This is a threat advisory for the Tiscali App.

Added: October 23, 2018
image from Combating Web Scraping In Online Businesses

Combating Web Scraping In Online Businesses

This report takes a look at the harmful practice of web scraping.

Added: October 20, 2018
image from 2016 Cyber Weapons Report

2016 Cyber Weapons Report

A Bulleton recapping headlines and stores in the Global Insurance and Regulatory industry.

Added: October 17, 2018
image from Executive Briefing Series: Mobile Cyber Security

Executive Briefing Series: Mobile Cyber Security

This is a brief introduction to Mobile Cyber Security

Added: October 16, 2018
© Cyentia Institute 2025
Library updated: June 26, 2025 16:08 UTC (build b1d7be4)