Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Standard

Below you will find reports with the tag of “Security Standard”

image from Build Vs Buy: Dynamic Authorization Solutions

Build Vs Buy: Dynamic Authorization Solutions

Within this review, you’ll find an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.

(more available)
Added: October 13, 2018
image from Continuous Monitoring And Compliance In The Cloud

Continuous Monitoring And Compliance In The Cloud

This whitepaper takes a look at the issues of using and implementing continuous monitoring and maintaining government compliance.

Added: October 13, 2018
image from Controlling Lateral Movement In Unix And Linux Environments

Controlling Lateral Movement In Unix And Linux Environments

This technical brief will describe how you can use PowerBroker for Unix & Linux in your *NIX server environment to address and enforce the NIST requirements, as well as the principles of a mature system access model to limit or prevent lateral movement within your environment. These principles apply to identity management, access control, and server configuration and monitoring, operating as a triad to support a strong security program.

(more available)
Added: October 13, 2018
image from Game Plan for Closing the SecOPS Gap

Game Plan for Closing the SecOPS Gap

Forbes created a new survey. And, from that survey, a common theme emerged from the survey and the one-on-one interviews: today’s enterprises need a modern game plan that uses technology, people and processes to close the SecOps gap.

(more available)
Added: October 13, 2018
image from Getting Ready For The GDPR

Getting Ready For The GDPR

This whitepaper provides insight into getting ready for the GDPR.

Added: October 13, 2018
image from 2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

This report will help you benchmark your third-party risk management program and its performance against trends in the market and best practices.

(more available)
Added: October 12, 2018
image from IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions widespread, trusted identity exchanges using federated methods that are secure, interoperable, privacy-enhancing and easy to use. Realization of that vision will require companies, agencies and individuals to perform at a new level. The Requirements are our first step towards that goal, by describing a set of functions that parties must be able to fulfill, and a set of criteria for assessing those capabilities.

(more available)
Added: October 12, 2018
image from Legal Cybersecurity Checklist

Legal Cybersecurity Checklist

This whitepaper seeks to provide aid to lawfirms and their need for security compliance with their clients.

Added: October 12, 2018
image from State Of The Global Technology Economy

State Of The Global Technology Economy

In this report, they examine research on the global growth of technology spend and spending patterns behind the highest performing companies. They also share best practices used by top performers to maximize the business value of their spend.

(more available)
Added: October 12, 2018
image from Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

In this report they seek to answer four important questions. How mature is the profession today? Where are we weakest/strongest? Which improvements in maturity are likely to matter most? How do we rate against others in our industry?

(more available)
Added: October 12, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 12:08 UTC (build b1d7be4)