/wp-content/uploads/2023/08/P2P-Cover.jpg
792
612
Carolyn Gimarelli
/wp-content/uploads/[email protected]
Carolyn Gimarelli2023-08-07 17:28:132023-08-18 11:43:26Prioritization to Prediction, Vol. 9: Role of the known exploited vulnerability catalog in risk-based vulnerability management
/wp-content/uploads/[email protected]
0
0
Carolyn Gimarelli
/wp-content/uploads/[email protected]
Carolyn Gimarelli2023-06-26 12:15:152023-06-26 12:50:23Strengthening Healthcare Security: Optimizing Vulnerability Remediation with IRIS Risk Retina
/wp-content/uploads/2023/05/SSC-AVD-MU-2.png
1281
1920
Carolyn Gimarelli
/wp-content/uploads/[email protected]
Carolyn Gimarelli2023-06-05 12:15:352023-06-21 16:23:57New Research: Close Encounters of the Third & Fourth Party Kind Subsector Reports
/wp-content/uploads/2023/05/Intro-3.jpg
900
1600
Carolyn Gimarelli
/wp-content/uploads/[email protected]
Carolyn Gimarelli2023-06-01 08:00:332023-05-31 13:50:10New Research: Balancing Third-Party Risk
/wp-content/uploads/2023/05/Screenshot-2023-05-17-at-9.20.48-AM.png
980
1832
Wade Baker
/wp-content/uploads/[email protected]
Wade Baker2023-05-25 12:15:502023-05-26 17:05:25Visualizing the Value of Attack Path Choke Points for Prioritization
/wp-content/uploads/Arete-Reining-In-Ransomware_Page_01.png
1584
1224
John Sturgis
/wp-content/uploads/[email protected]
John Sturgis2022-10-14 08:13:112022-10-14 08:13:11Finding (san)Key Protections Against Ransomware
/wp-content/uploads/mitigating-ransomware-cover-pdf.jpg
1408
1088
John Sturgis
/wp-content/uploads/[email protected]
John Sturgis2022-06-10 13:38:562022-08-23 15:15:04Paying Ransoms & Information Asymmetry
/wp-content/uploads/cybersupplychain.png
302
705
Wade Baker
/wp-content/uploads/[email protected]
Wade Baker2022-01-26 12:09:542022-06-14 12:32:58Bridging 18y Studying Cyber Risk in Supply Chains
/wp-content/uploads/IRIS-Tsunami-cover-1.png
1848
1428
John Sturgis
/wp-content/uploads/[email protected]
John Sturgis2021-10-26 09:24:352022-06-14 12:47:36IRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents
/wp-content/uploads/elevate-training-org.png
586
1076
Wade Baker
/wp-content/uploads/[email protected]
Wade Baker2021-06-28 09:40:532022-06-14 15:58:02Salving Human Risk in Cybersecurity
© Copyright 2023 Cyentia Institute
Scroll to top