• About
    • Our Name
    • Our Team
    • Our Interns
    • Our Clients
    • Our Methods
  • Services
    • IRIS Risk Retina
    • Exploit Intel Service
  • Research
    • Publications Gallery
    • IRIS Series
    • IRIS 2022
    • Research Services
  • Thought Leadership
    • Our Clients
    • Press Releases
    • Publications Gallery
    • Library
    • Events
    • Webinars
    • Blog
  • Webinars
  • Blog
  • Events
  • Library
  • Contact
  • Menu Menu
  • LinkedIn
  • Twitter
  • Youtube
  • Facebook
  • Instagram
Search

Report

Category

Press Releases | August 7, 2023

Prioritization to Prediction, Vol. 9: Role of the known exploited vulnerability catalog in risk-based vulnerability management

Read More
/wp-content/uploads/2023/08/P2P-Cover.jpg 792 612 Carolyn Gimarelli /wp-content/uploads/[email protected] Carolyn Gimarelli2023-08-07 17:28:132023-08-18 11:43:26Prioritization to Prediction, Vol. 9: Role of the known exploited vulnerability catalog in risk-based vulnerability management
IRIS | June 26, 2023

Strengthening Healthcare Security: Optimizing Vulnerability Remediation with IRIS Risk Retina

Read More
/wp-content/uploads/[email protected] 0 0 Carolyn Gimarelli /wp-content/uploads/[email protected] Carolyn Gimarelli2023-06-26 12:15:152023-06-26 12:50:23Strengthening Healthcare Security: Optimizing Vulnerability Remediation with IRIS Risk Retina
Press Releases | June 5, 2023

New Research: Close Encounters of the Third & Fourth Party Kind Subsector Reports

Read More
/wp-content/uploads/2023/05/SSC-AVD-MU-2.png 1281 1920 Carolyn Gimarelli /wp-content/uploads/[email protected] Carolyn Gimarelli2023-06-05 12:15:352023-06-21 16:23:57New Research: Close Encounters of the Third & Fourth Party Kind Subsector Reports
Press Releases | June 1, 2023

New Research: Balancing Third-Party Risk

Read More
/wp-content/uploads/2023/05/Intro-3.jpg 900 1600 Carolyn Gimarelli /wp-content/uploads/[email protected] Carolyn Gimarelli2023-06-01 08:00:332023-05-31 13:50:10New Research: Balancing Third-Party Risk
Analysis | May 25, 2023

Visualizing the Value of Attack Path Choke Points for Prioritization

Read More
/wp-content/uploads/2023/05/Screenshot-2023-05-17-at-9.20.48-AM.png 980 1832 Wade Baker /wp-content/uploads/[email protected] Wade Baker2023-05-25 12:15:502023-05-26 17:05:25Visualizing the Value of Attack Path Choke Points for Prioritization
Analysis | October 14, 2022

Finding (san)Key Protections Against Ransomware

Read More
/wp-content/uploads/Arete-Reining-In-Ransomware_Page_01.png 1584 1224 John Sturgis /wp-content/uploads/[email protected] John Sturgis2022-10-14 08:13:112022-10-14 08:13:11Finding (san)Key Protections Against Ransomware
Analysis | June 10, 2022

Paying Ransoms & Information Asymmetry

Read More
/wp-content/uploads/mitigating-ransomware-cover-pdf.jpg 1408 1088 John Sturgis /wp-content/uploads/[email protected] John Sturgis2022-06-10 13:38:562022-08-23 15:15:04Paying Ransoms & Information Asymmetry
Analysis | January 26, 2022

Bridging 18y Studying Cyber Risk in Supply Chains

Read More
/wp-content/uploads/cybersupplychain.png 302 705 Wade Baker /wp-content/uploads/[email protected] Wade Baker2022-01-26 12:09:542022-06-14 12:32:58Bridging 18y Studying Cyber Risk in Supply Chains
Analysis | October 26, 2021

IRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents

Read More
/wp-content/uploads/IRIS-Tsunami-cover-1.png 1848 1428 John Sturgis /wp-content/uploads/[email protected] John Sturgis2021-10-26 09:24:352022-06-14 12:47:36IRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents
Analysis | June 28, 2021

Salving Human Risk in Cybersecurity

Read More
/wp-content/uploads/elevate-training-org.png 586 1076 Wade Baker /wp-content/uploads/[email protected] Wade Baker2021-06-28 09:40:532022-06-14 15:58:02Salving Human Risk in Cybersecurity
© Copyright 2023 Cyentia Institute
  • LinkedIn
  • Twitter
  • Youtube
  • Facebook
  • Instagram
  • Contact
  • Blog
  • Events
  • Research Gallery
  • Research Services
  • Services
  • Privacy Policy
  • Sitemap
Scroll to top