Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vuln Management

Below you will find reports with the tag of “Vuln Management”

image from Top 5 Reasons Why Savvy MSPS Are Adopting Managed Security Services

Top 5 Reasons Why Savvy MSPS Are Adopting Managed Security Services

The purpose of this white paper is to introduce managed security services as a key strategy for evolving your business.

(more available)
Added: December 29, 2018
image from How Tanium Addresses the NIST Cybersecurity Framework

How Tanium Addresses the NIST Cybersecurity Framework

This paper provides a helpful checklist for NIST adoption.

Added: December 29, 2018
image from IT Management on the Brink: Reaching a Breaking Point in Capabilities

IT Management on the Brink: Reaching a Breaking Point in Capabilities

This paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.

(more available)
Added: December 29, 2018
image from Measuring & Managing the Cyber Risks to Business Operations

Measuring & Managing the Cyber Risks to Business Operations

Measuring & Managing the Cyber Risks to Business Operations, which was sponsored by Tenable and conducted by Ponemon Institute, reveals global trends in how organizations are assessing and addressing cybersecurity risks. We conclude from the findings that current approaches to understanding cyber risks to business operations are failing to help organizations minimize and mitigate threats. We surveyed 2,410 IT and IT security practitioners in the United States, United Kingdom, Germany, Australia, Mexico and Japan. All respondents have involvement in the evaluation and/or management of investments in cybersecurity solutions within their organizations. The consolidated global findings are presented in this report.

(more available)
Added: December 14, 2018
image from NotPetya: One Year Later

NotPetya: One Year Later

“Almost immediately following the WannaCry cyberattack, the NotPetya malware affected countries and organisations around the globe that had strikingly similar repercussions and lessons to take away. This attack exemplified the chronic failings organisations and nation-states continue to have despite the blatant and ongoing threats cyberspace poses. With cyber threats remaining a critical issue for organisations, there is still a great deal organisations need to do to mitigate these for future resilience.”

(more available)
Added: November 29, 2018
image from Closing The Gap On Breach Readiness

Closing The Gap On Breach Readiness

This e-book contains insights on breach readiness, response and resiliency based on in-depth interviews conducted with the Security for Business Innovation Council (SBIC). The SBIC is comprised of forward-thinking security executives from Global 1000 enterprises committed to advancing the state of information security worldwide by sharing insights from their real-world experience.

(more available)
Added: November 27, 2018
image from Now Tech: Container Security, Q4 2018

Now Tech: Container Security, Q4 2018

You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you’ll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security pros should use Forrester’s Now Tech report to understand the value they can expect from a container security provider and select vendors based on size and functionality.

(more available)
Added: November 20, 2018
image from Vulnerability Intelligence Report

Vulnerability Intelligence Report

In this report, they provide an overview of current vulnerability disclosure trends and insights into real-world vulnerability demographics in enterprise environments. they analyze vulnerability prevalence in the wild, based on the number of affected enterprises, to highlight vulnerabilities that security practitioners are dealing with in practice - not just in theory.

(more available)
Added: November 16, 2018
image from SecurityScorecard 2018 Healthcare Report

SecurityScorecard 2018 Healthcare Report

“In this year’s report, SecurityScorecard looked at more than 1200 healthcare companies from July 2017 through the end of the year and analyzed terabytes of information to assess risk across ten risk factors.”

(more available)
Added: November 4, 2018
image from 2016 Hacked Website Report Q1

2016 Hacked Website Report Q1

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 26, 2018
image from 2016 Vulnerability Statistics Report

2016 Vulnerability Statistics Report

This document discusses the vulnerabilities discovered by edgescanTM over the past year – 2016. The vulnerabilities discovered are a result of providing “Fullstack” continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises, From Telecoms & Media companies to Software Development, Gaming, Energy and Medical organisations. The statistics are based on the continuous security assessment & management of over 57,000 systems distributed globally.

(more available)
Added: October 26, 2018
image from 2018 Annual Cybersecurity Report

2018 Annual Cybersecurity Report

In the executive summary, this report asks, “What if defenders could see the future?” it then goes on to say that defenders can see what’s on the horizon and many clues are out there and obvious. The entire report seeks to outline ways in which defenders can see the future.

(more available)
Added: October 26, 2018
image from 2018 State Of Vulnerability Risk Management

2018 State Of Vulnerability Risk Management

This report offers an analysis into current trends in vulnerability risk management. It examines the attributes of security vulnerabilities viewed through a variety of lenses: Attributes of vulnerabilities published since 2002 versus those only recently published, Attributes of all vulnerabilities published in the National Vulnerability Database (NVD) in contrast with only those uploaded into our platform by our clients, Vulnerabilities broken down by industry vertical, CVSS score, product vendor and active exploitation in the wild.

(more available)
Added: October 26, 2018
image from A Guide To Endpoint Privilege Management: Secuirty Fundamentals

A Guide To Endpoint Privilege Management: Secuirty Fundamentals

In this whitepaper you will learn what endpoint privilege management is and how an effective approach significantly enhances an organization’s security against rising cyber crime. They cover the origins of the least privilege concept, the benefits of application control, the current cyber threat landscape and how endpoint privilege management works to combat this with minimal disruption to user productivity.

(more available)
Added: October 26, 2018
image from Cloud Infrastructure In The Federal Government

Cloud Infrastructure In The Federal Government

Many federal agencies have begun adoption of modern, agile approaches to software delivery, with the goal of building higher quality services faster and more cheaply. While there are significant barriers to the adoption of this paradigm in the federal government, this paper offers specific principles and practices that have already achieved success.

(more available)
Added: October 26, 2018
image from Cloud Security Trends: February 2018

Cloud Security Trends: February 2018

This is a report on cloud security trends.

Added: October 26, 2018
image from Demystifying Vulnerabilitiy Management

Demystifying Vulnerabilitiy Management

This report takes a close look at vulnerability management and seeks to make it a far simpler task.

Added: October 26, 2018
image from Threats Report - December 2016

Threats Report - December 2016

An interview-based report, drawing from interviews of 400 security professionals. Covers topics such as the current state of SOC design, ransomware, and the rise of malware in otherwise legitimate software.

(more available)
Added: October 26, 2018
image from 2015 Vulnerability Statistics Report

2015 Vulnerability Statistics Report

This document discusses the vulnerabilities discovered by edgescanTM over the past year – 2015. The vulnerabilities discovered are a result of providing continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises; Telecoms & Media, Software Development, Gaming, Energy and Medical organizations.

(more available)
Added: October 25, 2018
image from 2016 State of Vulnerability Risk Management

2016 State of Vulnerability Risk Management

The goal of this report is to shed some light on the current threat landscape for organizations, assess the strengths and weaknesses of current vulnerability evaluation systems such as CVSS, (Common Vulnerability Scoring System) and explore additional metrics for determining the risk of a vulnerability.

(more available)
Added: October 25, 2018
image from 2018 Application Protection Report

2018 Application Protection Report

In this report, they examine that series of interacting tiers—application services, application access, Transport Layer Security (TLS), domain name services (DNS), and the network—because each one is a potential target of attack.

(more available)
Added: October 25, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)