• About
    • Our Name
    • Our Team
    • Our Interns
    • Our Methods
  • Services
    • IRIS Risk Retina
    • Exploit Intel Service
  • Research
    • Publications Gallery
    • IRIS Series
    • IRIS 2022
    • Research Services
  • Clients
  • Library
  • Events
  • Blog
  • Episodes
  • Contact
  • Menu Menu
  • LinkedIn
  • Twitter
  • Youtube
Search

Report

Category

Analysis | October 14, 2022

Finding (san)Key Protections Against Ransomware

Read More
/wp-content/uploads/Arete-Reining-In-Ransomware_Page_01.png 1584 1224 John Sturgis /wp-content/uploads/[email protected] John Sturgis2022-10-14 08:13:112022-10-14 08:13:11Finding (san)Key Protections Against Ransomware
Analysis | June 10, 2022

Paying Ransoms & Information Asymmetry

Read More
/wp-content/uploads/mitigating-ransomware-cover-pdf.jpg 1408 1088 John Sturgis /wp-content/uploads/[email protected] John Sturgis2022-06-10 13:38:562022-08-23 15:15:04Paying Ransoms & Information Asymmetry
Analysis | January 26, 2022

Bridging 18y Studying Cyber Risk in Supply Chains

Read More
/wp-content/uploads/cybersupplychain.png 302 705 Wade Baker /wp-content/uploads/[email protected] Wade Baker2022-01-26 12:09:542022-06-14 12:32:58Bridging 18y Studying Cyber Risk in Supply Chains
Analysis | October 26, 2021

IRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents

Read More
/wp-content/uploads/IRIS-Tsunami-cover-1.png 1848 1428 John Sturgis /wp-content/uploads/[email protected] John Sturgis2021-10-26 09:24:352022-06-14 12:47:36IRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents
Analysis | June 28, 2021

Salving Human Risk in Cybersecurity

Read More
/wp-content/uploads/elevate-training-org.png 586 1076 Wade Baker /wp-content/uploads/[email protected] Wade Baker2021-06-28 09:40:532022-06-14 15:58:02Salving Human Risk in Cybersecurity
Analysis | January 21, 2021

I Once Called Vuln Researchers NVPs; Are They MVPs Instead?

Read More
/wp-content/uploads/p2pv6fig21.png 1236 2046 Wade Baker /wp-content/uploads/[email protected] Wade Baker2021-01-21 08:00:222022-06-14 16:05:36I Once Called Vuln Researchers NVPs; Are They MVPs Instead?
Analysis | December 10, 2020

What Matters More in Software Security - Nature or Nurture?

Read More
/wp-content/uploads/soss11-fig16.png 1114 1794 Wade Baker /wp-content/uploads/[email protected] Wade Baker2020-12-10 12:00:532022-06-14 16:12:26What Matters More in Software Security - Nature or Nurture?
News | November 20, 2020

IRIS 20/20 Xtreme Webinar - Audience Questions

Read More
/wp-content/uploads/figure05.png 600 2100 David Severski /wp-content/uploads/[email protected] David Severski2020-11-20 16:03:542022-06-14 18:20:04IRIS 20/20 Xtreme Webinar - Audience Questions
Analysis | November 19, 2020

Who Has the Advantage - Attackers or Defenders?

Read More
/wp-content/uploads/p2pv6-fig20.png 1042 1892 Wade Baker /wp-content/uploads/[email protected] Wade Baker2020-11-19 11:22:062022-06-14 18:49:20Who Has the Advantage - Attackers or Defenders?
Report | November 10, 2020

Cyentia Institute Publishes IRIS Xtreme on the 100 Largest Cyber Loss Events

Read More
/wp-content/uploads/iris-x-cover.png 3300 2550 David Severski /wp-content/uploads/[email protected] David Severski2020-11-10 01:08:302022-06-14 18:50:58Cyentia Institute Publishes IRIS Xtreme on the 100 Largest Cyber Loss Events
© Copyright 2023 Cyentia Institute
  • LinkedIn
  • Twitter
  • Youtube
  • Contact
  • Blog
  • Events
  • Research Gallery
  • Research Services
  • Services
  • Privacy Policy
  • Sitemap
Scroll to top