• About
    • Our Name
    • Our Team
    • Our Interns
    • Our Clients
    • Our Methods
  • Services
    • IRIS Risk Retina
    • Exploit Intel Service
  • Research
    • Publications Gallery
    • IRIS Series
    • IRIS 2022
    • Research Services
  • Thought Leadership
    • Our Clients
    • Press Releases
    • Publications Gallery
    • Library
    • Events
    • Webinars
    • Blog
  • Webinars
  • Blog
  • Events
  • Library
  • Contact
  • Menu Menu
  • LinkedIn
  • Twitter
  • Youtube
  • Facebook
  • Instagram
Search

Wade Baker

Author

Analysis | August 4, 2023

The Pithy P2P: 5 years of vulnerability remediation & exploitation research

Read More
/wp-content/uploads/2023/07/Screenshot-2023-07-31-at-11.46.27-AM.jpg 540 1632 Wade Baker /wp-content/uploads/[email protected] Wade Baker2023-08-04 12:15:092023-08-08 14:31:13The Pithy P2P: 5 years of vulnerability remediation & exploitation research
Analysis | July 5, 2023

Patching, Fast and Slow

Read More
/wp-content/uploads/2023/06/vuln-surv-cats.jpg 1022 1840 Wade Baker /wp-content/uploads/[email protected] Wade Baker2023-07-05 12:15:392023-06-30 13:02:21Patching, Fast and Slow
Analysis | June 19, 2023

The Hidden Complexity of Vulnerability Remediation: Bridging the Gap between Data and Common Advice

Read More
/wp-content/uploads/2023/06/Wades-LinkedIn-Blog-Post-Imsge.jpeg 557 800 Wade Baker /wp-content/uploads/[email protected] Wade Baker2023-06-19 12:15:102023-06-21 16:25:57The Hidden Complexity of Vulnerability Remediation: Bridging the Gap between Data and Common Advice
Analysis | May 25, 2023

Visualizing the Value of Attack Path Choke Points for Prioritization

Read More
/wp-content/uploads/2023/05/Screenshot-2023-05-17-at-9.20.48-AM.png 980 1832 Wade Baker /wp-content/uploads/[email protected] Wade Baker2023-05-25 12:15:502023-05-26 17:05:25Visualizing the Value of Attack Path Choke Points for Prioritization
Analysis | February 28, 2023

Supply Chain Multiplicity: Not as sharp as the original

Read More
/wp-content/uploads/multiplicity-cover-e1680795710149.png 555 800 Wade Baker /wp-content/uploads/[email protected] Wade Baker2023-02-28 21:04:572023-05-26 17:04:04Supply Chain Multiplicity: Not as sharp as the original
Analysis | August 25, 2022

Call for Sponsors: Meta-Study on ATT&CK techniques

Read More
/wp-content/uploads/attack-soso.png 1028 1878 Wade Baker /wp-content/uploads/[email protected] Wade Baker2022-08-25 11:33:152022-08-25 12:06:21Call for Sponsors: Meta-Study on ATT&CK techniques
Analysis | January 26, 2022

Bridging 18y Studying Cyber Risk in Supply Chains

Read More
/wp-content/uploads/cybersupplychain.png 302 705 Wade Baker /wp-content/uploads/[email protected] Wade Baker2022-01-26 12:09:542022-06-14 12:32:58Bridging 18y Studying Cyber Risk in Supply Chains
Analysis | June 28, 2021

Salving Human Risk in Cybersecurity

Read More
/wp-content/uploads/elevate-training-org.png 586 1076 Wade Baker /wp-content/uploads/[email protected] Wade Baker2021-06-28 09:40:532022-06-14 15:58:02Salving Human Risk in Cybersecurity
News | March 10, 2021

Help Save the Cybersecurity Research Library!

Read More
/wp-content/uploads/DigitalLibrary.png 800 1600 Wade Baker /wp-content/uploads/[email protected] Wade Baker2021-03-10 10:36:142022-06-14 16:03:03Help Save the Cybersecurity Research Library!
Analysis | January 21, 2021

I Once Called Vuln Researchers NVPs; Are They MVPs Instead?

Read More
/wp-content/uploads/p2pv6fig21.png 1236 2046 Wade Baker /wp-content/uploads/[email protected] Wade Baker2021-01-21 08:00:222022-06-14 16:05:36I Once Called Vuln Researchers NVPs; Are They MVPs Instead?
© Copyright 2023 Cyentia Institute
  • LinkedIn
  • Twitter
  • Youtube
  • Facebook
  • Instagram
  • Contact
  • Blog
  • Events
  • Research Gallery
  • Research Services
  • Services
  • Privacy Policy
  • Sitemap
Scroll to top