• Link to LinkedIn Link to LinkedIn Link to LinkedIn
  • Link to X Link to X Link to X
  • Link to Youtube Link to Youtube Link to Youtube
  • Link to Facebook Link to Facebook Link to Facebook
  • Link to Instagram Link to Instagram Link to Instagram
  • Services
  • IRIS Series
    • Information Risk Insights Study
    • IRIS 2025
    • IRIS Ransomware
    • IRIS 2022
    • IRIS Tsunami
    • IRIS Xtreme
    • IRIS 20/20
  • Publications
  • Library
  • Events
    • Upcoming Events
    • Watch Cyentia Webinar Episodes
  • Blog
  • About
    • About Cyentia
    • Press Releases
    • Our Team
    • Our Clients
    • Our Methods
  • Contact
    • Contact the Cyentia Team
    • Sponsor
  • Cyentia Membership
    • About Membership
    • Join
    • Log In
  • Menu Menu
Search

Report

Category

| May 25, 2023

Visualizing the Value of Attack Path Choke Points for Prioritization

Read More
/wp-content/uploads/2023/05/Screenshot-2023-05-17-at-9.20.48-AM.png 980 1832 Wade Baker /wp-content/uploads/[email protected] Wade Baker2023-05-25 12:15:502025-08-18 11:15:26Visualizing the Value of Attack Path Choke Points for Prioritization
| October 14, 2022

Finding (san)Key Protections Against Ransomware

Read More
/wp-content/uploads/Arete-Reining-In-Ransomware_Page_01.png 1584 1224 John Sturgis /wp-content/uploads/[email protected] John Sturgis2022-10-14 08:13:112024-11-19 12:35:03Finding (san)Key Protections Against Ransomware
| June 10, 2022

Paying Ransoms & Information Asymmetry

Read More
/wp-content/uploads/mitigating-ransomware-cover-pdf.jpg 1408 1088 John Sturgis /wp-content/uploads/[email protected] John Sturgis2022-06-10 13:38:562025-08-18 11:15:25Paying Ransoms & Information Asymmetry
| January 26, 2022

Bridging 18y Studying Cyber Risk in Supply Chains

Read More
/wp-content/uploads/cybersupplychain.png 302 705 Wade Baker /wp-content/uploads/[email protected] Wade Baker2022-01-26 12:09:542024-11-19 12:35:04Bridging 18y Studying Cyber Risk in Supply Chains
| October 26, 2021

IRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents

Read More
/wp-content/uploads/IRIS-Tsunami-cover-1.png 1848 1428 John Sturgis /wp-content/uploads/[email protected] John Sturgis2021-10-26 09:24:352024-11-19 12:35:05IRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents
| June 28, 2021

Salving Human Risk in Cybersecurity

Read More
/wp-content/uploads/elevate-training-org.png 586 1076 Wade Baker /wp-content/uploads/[email protected] Wade Baker2021-06-28 09:40:532024-11-19 12:35:05Salving Human Risk in Cybersecurity
| January 21, 2021

I Once Called Vuln Researchers NVPs; Are They MVPs Instead?

Read More
/wp-content/uploads/p2pv6fig21.png 1160 1920 Wade Baker /wp-content/uploads/[email protected] Wade Baker2021-01-21 08:00:222025-08-18 11:15:23I Once Called Vuln Researchers NVPs; Are They MVPs Instead?
| December 10, 2020

What Matters More in Software Security - Nature or Nurture?

Read More
/wp-content/uploads/soss11-fig16.png 1114 1794 Wade Baker /wp-content/uploads/[email protected] Wade Baker2020-12-10 12:00:532024-11-19 12:35:16What Matters More in Software Security - Nature or Nurture?
| November 20, 2020

IRIS 20/20 Xtreme Webinar - Audience Questions

Read More
/wp-content/uploads/figure05.png 600 2100 David Severski /wp-content/uploads/[email protected] David Severski2020-11-20 16:03:542024-11-19 12:35:16IRIS 20/20 Xtreme Webinar - Audience Questions
| November 19, 2020

Who Has the Advantage - Attackers or Defenders?

Read More
/wp-content/uploads/p2pv6-fig20.png 1042 1892 Wade Baker /wp-content/uploads/[email protected] Wade Baker2020-11-19 11:22:062024-11-19 12:35:17Who Has the Advantage - Attackers or Defenders?
© Copyright 2026 Cyentia Institute
  • Link to LinkedIn Link to LinkedIn Link to LinkedIn
  • Link to X Link to X Link to X
  • Link to Youtube Link to Youtube Link to Youtube
  • Link to Facebook Link to Facebook Link to Facebook
  • Link to Instagram Link to Instagram Link to Instagram
Scroll to top