Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vuln Management

Below you will find reports with the tag of “Vuln Management”

image from Internt of Tip-offs (IoT)

Internt of Tip-offs (IoT)

An analysis on the indicators to be derived from detecting Internet of Things (IoT) in organization’s public internet facing profiles.

(more available)
Added: January 26, 2021
image from 2020 Q3 Report: Vulnerability QuickView

2020 Q3 Report: Vulnerability QuickView

This report covers vulnerabilities disclosed this year. It aims to help the reader navigate the current vulnerability landscape. It provides valuable insight into vulnerability trends and how they are impacting organizations.

(more available)
Added: December 16, 2020
image from Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

This sixth volume of the Prioritization to Prediction series combines vulnerability data from Kenna’s customers with additional intelligence from Fortinet and others. This volume provides a quantitative analysis of the timeline of key dates in the lifecycle of an exploited vulnerability, exploring the effects of releasing exploit code relative to the date of CVE publication and patch availability, discussing the ramifications to attackers and defenders.

(more available)
Added: November 18, 2020
image from Bulletproof Annual Cyber Security Industry Report 2020

Bulletproof Annual Cyber Security Industry Report 2020

Drawing from their managed SIEM, vulnerability scanning, and penetration testing practices, this report covers the key threat and compliance challenges over the 2019 calendar year.

(more available)
Added: October 19, 2020
image from Bulletproof Annual Cyber Security Report 2019

Bulletproof Annual Cyber Security Report 2019

Drawing from their managed SIEM, vulnerability scanning, and penetration testing services, this report reviews the key trends from the 2018 calendar year.

(more available)
Added: October 19, 2020
image from When the World Stayed Home

When the World Stayed Home

This report was compiled from interviews with 1,004 company leaders in order to find the effect of remote work on their companies.

(more available)
Added: September 27, 2020
image from Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

An extension of the Prioritization to Prediction series, this report uses a sample of over 40 manufacturing sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Healthcare Sector

Vulnerability Remediation Performance Snapshot for the Healthcare Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 30 healthcare sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Finance Sector

Vulnerability Remediation Performance Snapshot for the Finance Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 100 finance sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Technology Sector

Vulnerability Remediation Performance Snapshot for the Technology Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 70 technology services to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Modern Application Development Security

Modern Application Development Security

This study examines trends in application development security. It looks as the extent to which security teams understand modern development practices, what influences application security investments, and the dynamic between development teams and cybersecurity teams.

(more available)
Added: September 2, 2020
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

The objective of this report is to provide nuanced insight into the ICS risk and vulnerability landscape, the challenges it poses to operational technology (OT) security practitioners, and what conclusions can be drawn from publicly available data.

(more available)
Added: September 2, 2020
image from Under the Hoodie 2019

Under the Hoodie 2019

A review of 180 engagements performed by Rapid7 consulting, supplemented by a survey of questions given to all Rapid7 consulting customers. Addresses lessons learned from this events.

(more available)
Added: August 28, 2020
image from The state of vulnerability management in the cloud and on-premises

The state of vulnerability management in the cloud and on-premises

A survey-baed report of 1,848 IT and IT Security professionals on the challenges with vulnerability prioritization and the importance of patch management for the prevention of breaches. Touches on the challenges of CMDBs and container security.

(more available)
Added: August 18, 2020
image from 2020 Open Source Security and Risk Analysis Report

2020 Open Source Security and Risk Analysis Report

The 2020 OSSRA includes insights and recommendations to help security, risk, legal, and development teams better understand the open source security and license risk landscape.

(more available)
Added: July 31, 2020
image from SolarWindws Public Sector Cybersecurity Survey Report

SolarWindws Public Sector Cybersecurity Survey Report

A survey of 400 public sector IT decision makers and influencers to determine challenges faced by public sector IT professionals, security threats, and cybersecurity capabilities.

(more available)
Added: July 22, 2020
image from Weaving a Safer Web: The State and Significance of TLS 1.2 Support

Weaving a Safer Web: The State and Significance of TLS 1.2 Support

A deep dive into the state of deploying the latest TLS version (v1.2) and the use of this signal for correlating with broader public-facing risk surfaces and characteristics of firms.

(more available)
Added: July 6, 2020
image from 2020 Vulnerability Statistics Report

2020 Vulnerability Statistics Report

The fifth edition of Edgescan’s vulnerability statistics report. Uses both scan data and survey data to report on vulnerability management, with a special focus on web application vulnerabilities.

(more available)
Added: June 13, 2020
image from 70% of IT Pros Cite "Consistent Data Across Systems and IT Depts." as Unified IT's #1 Benefit

70% of IT Pros Cite "Consistent Data Across Systems and IT Depts." as Unified IT's #1 Benefit

This survey looked at the state of IT departments in 2020 and where their priorities fell. After surveying more than 1,300 IT professionals, it’s clear vendor management and contract negotiation is becoming a time-consuming endeavor. In fact, 50% of IT professionals work with 11 or more vendors and nearly half (48%) spend weeks or months renegotiating their vendor contracts each year.

(more available)
Added: May 8, 2020
image from Prioritization to Prediction: Volume 5

Prioritization to Prediction: Volume 5

P2P Volume 5 focuses on the differences between asset types (OS) and how vulnerabilities are treated on different platforms.

Added: April 21, 2020
image from Microsoft Vulnerabilities Report 2020

Microsoft Vulnerabilities Report 2020

This is the 7th annual edition of the Microsoft Vulnerabilities Report, and includes a five-year trend comparison, giving you a better understanding of how vulnerabilities are growing and in which specific products.

(more available)
Added: April 5, 2020
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)