Trusted Access Report 2016Industry reportSummaryThis paper takes a look at the current state of device security. Source(s): Duo, NATopic(s): Controls, Information Assets, ThreatsSubtopic(s): Actors and motives, CIS "Top20" Controls, Desktop software, Events and TTPs, External services, Infrastructure, VulnerabilityVIEW SOURCE Comments or Fixes for this report? 0 replies Leave a ReplyWant to join the discussion? Feel free to contribute! Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Comment This site uses Akismet to reduce spam. Learn how your comment data is processed.