[{"id":13012,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Verizon_Protected_Health_Information_Data_Breach_Report_2018.pdf"},{"id":13011,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CASCADE_Cybersecurity_Labor_Market_Analysis_2018.pdf"},{"id":13010,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CPR_Cyber_Attack_Trends_Mid_Year_Report_2018.pdf"},{"id":13009,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Puppet_DORA_State_Of_DevOps_2016.pdf"},{"id":13008,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Puppet_DORA_State_Of_DevOps_Report_2017.pdf"},{"id":13007,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/NAVA_DORA_Cloud_Infrastructure_In_The_Federal_Government_2018.pdf"},{"id":13006,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/DORA_State_Of_DevOps_2018.pdf"},{"id":13005,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/SANS_SOC_Survey_2018.pdf"},{"id":13004,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Ponemon_Anomali_The_Value_Of_Threat_Intelligence_2017.pdf"},{"id":13003,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/PwC_Global_Blockchain_Survey_Executive_Summary_2018.pdf"},{"id":13002,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/PWC_CEO_Survey_Report_2018.pdf"},{"id":13001,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Rapid7_Under_The_Hoodie_Research_Report_2018.pdf"},{"id":13000,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/ESG_Research_Report_Security_Analytics_And_Operations_2017.pdf"},{"id":12999,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/ESG_ISSA_Research_Report_Life_Of_Cybersecurity_Professionals_2017.pdf"},{"id":12998,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Duo_Trusted_Access_Report_2016.pdf"},{"id":12997,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Duo_Trusted_Access_Report_2017.pdf"},{"id":12996,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CA_FrostSullivan_The_Global_State_Of_Online_Digital_Trust_2018.pdf"},{"id":12995,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Dragos_The_Four_Types of_Threat_Detection_2018.pdf"},{"id":12994,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Duo_Security_Two_Factor_Evaluation_Guide_2018.pdf"},{"id":12993,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Duo_The_Essential_Guide_To_Securing_Remote_Access_2016.pdf"},{"id":12992,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Duo_Security_Healthcare_Information_Security_Guide_2017.pdf"},{"id":12991,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Duo_Trusted_Access_Report_2018.pdf"},{"id":12990,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/DeviceAuthority_Enterprise_IoT_Security_Blueprint_2018.pdf"},{"id":12989,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/DeviceAuthority_Medical_Device_Insight_Guide_2018.pdf"},{"id":12988,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/DeviceAuthority_How_To_Choose_A_Security_Solution_For_The_IoT_2018.pdf"},{"id":12987,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/DeviceAuthority_Beginners_Guide_To_Encryption_2016.pdf"},{"id":12986,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Raconteur_Industry_4_0_2018.pdf"},{"id":12985,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/iovation_Why_Device_Age_Matters_2018.pdf"},{"id":12984,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/KuppingerCole_Leadership_Compass_August_2017.pdf"},{"id":12983,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Wandera_A_Guide_To_Web_Gateways_For_Mobile_2018.pdf"},{"id":12982,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/F5Labs_Application_Protection_Report_2018.pdf"},{"id":12981,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Ponemon_Arxan_Application_Security_Report_2018.pdf"},{"id":12980,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Rapid7_Quarterly_Threat_Report_Q2_2018.pdf"},{"id":12979,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Global_Advanced_Threat_Landscape_Report_2018.pdf"},{"id":12978,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Global_Advanced_Threat_Landscape_Report_Business_2018.pdf"},{"id":12977,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Global_Advanced_Threat_Landscape_Report_DEVOPS_2018.pdf"},{"id":12976,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Global_Advanced_Threat_Landscape_Survey_2016.pdf"},{"id":12975,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Addressing_The_Australian_Signals_Directorate_Essential_Eight_2018.pdf"},{"id":12974,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Behind_The_Hidden_Conversion_Of_Electricity_To_Money_2018.pdf"},{"id":12973,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Securing_Cloud_Workloads_On_Azure_2018.pdf"},{"id":12972,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Securing_Cloud_Workloads_On_Hybrid_AWS_2018.pdf"},{"id":12971,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Securing_Cloud_Workloads_On_AWS_2018.pdf"},{"id":12970,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_New_Australian_Data_Breach_Legislation_2018.pdf"},{"id":12969,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_SailPoint_The_Powers_Of_Identity_Governance_And_Privileged_Access_Security_2018.pdf"},{"id":12968,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Privileged_Access_Security_For_Dummies_2018.pdf"},{"id":12967,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_6_Principles_for_DevOps_Security_At_Scale_2018.pdf"},{"id":12966,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Demonstrating_GDPR_Compliance_To_Help_Protect_Against_Liability_2017.pdf"},{"id":12965,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Assessing_Risk_To_Personal_Data_Access_2017.pdf"},{"id":12964,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Detecting_And_Responding_Rapidly_To_Personal_Data_Breaches_2017.pdf"},{"id":12963,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Protecting_The_Pathways_To_Personal_Information_2017.pdf"},{"id":12962,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_A_Privileged_Account_Security_Approach_To_GDPR_Readiness_2017.pdf"},{"id":12961,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_6_Key_Use_Cases_For_Securing_Your_Organizations_Cloud_Workloads_2017.pdf"},{"id":12960,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_The_Cyber_Attackers_Playbook_2017.pdf"},{"id":12959,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_An_Attack_Pathway_Into_Your_Organization_2016.pdf"},{"id":12958,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_The_Danger_Within_Unmasking_Insider_Threats_2017.pdf"},{"id":12957,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_5_Top_Reasons_To_Prioritize_Privileged_Account_Security_Today_2016.pdf"},{"id":12956,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Achieving_Protection_And_Productivity_By_Securing_Privilege_On_The_Endpoint_2016.pdf"},{"id":12955,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/CyberArk_Seven_Things_To_Consider_2016.pdf"},{"id":12954,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Covisint_Creating_A_Frictionless_Automotive_Ecosystem_2017.pdf"},{"id":12953,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Hackerone_The_Hacker_Powered_Security_Report_2018.pdf"},{"id":12952,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Covisint_A_Holistic_Approach_To_Identity_Managing_For_The_Internet_Of_Things_2017.pdf"},{"id":12951,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Ponemon_Valimail_Email_Impersonation_Attacks_A_Clear_And_Present_Danger_2018.pdf"},{"id":12950,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/SecureAuth_CoreSecurity_Increasing_Identity_Security_Without_Increasing_User_Disruptions_2017.pdf"},{"id":12949,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/SecureAuth_CoreSecurity_Impact_Vs_Metasploit_2017.pdf"},{"id":12948,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Centrify_Best_Practices_For_Privileged_Identity_Management_2016.pdf"},{"id":12947,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Centrify_Six_Best_Practices_For_Securing_Amazon_Web_Service_2017.pdf"},{"id":12946,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Centrify_Who_Moved_My_Secure_Perimeter_2017.pdf"},{"id":12945,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Centrify_Top_Six_Things_To_Consider_With_An_Identity_As_A_Service_2018.pdf"},{"id":12944,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Centrify_Cordery_GDPR_Headlines_2018.pdf"},{"id":12943,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Centrify_Secure_The_Vote_With_Zero_Trust_Security_2018.pdf"},{"id":12942,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Centrify_Security_Privacy_And_The_Next_Generation_Workforce_2018.pdf"},{"id":12941,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Centrify_Equifax_A_Cautionary_Tale_2018.pdf"},{"id":12940,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/BeyondTrust_Controlling_Lateral_Movement_In_Unix_And_Linux_Environments_2018.pdf"},{"id":12939,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Proofpoint_Quarterly_Threat_Report_Q2_2018.pdf"},{"id":12938,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/DarkOwl_The_Darknet_Index_2018.pdf"},{"id":12937,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Osterman_Malwarebytes_White_Hat_Black_Hat_And_The_Emergence_Of_Gray_Hat_2018.pdf"},{"id":12936,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/IBM_The_Dangers_Of_Smart_City_Hacking_2018.pdf"},{"id":12935,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Kaspersky_The_State_Of_Industrial_Cybersecurity_2018.pdf"},{"id":12934,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/ESG_Siemplify_Security_Operations_Challenges_Priorities_And_Strategies_2017.pdf"},{"id":12933,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Tripwire_State_Of_Cyber_Hygiene_Report_2018.pdf"},{"id":12932,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/Accenture_Cyber_Threatscape_Report_2018.pdf"},{"id":12931,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_The_Power_To_Coerce_2016.pdf"},{"id":12930,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Getting_To_Yes_With_China_In_Cyberspace_2016.pdf"},{"id":12929,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Chinas_Evolving_Approach_To_Integrated_Strategic_Deterrence_2016.pdf"},{"id":12928,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Internet_Facilitated_Drugs_Trade_2016.pdf"},{"id":12927,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_US_Japan_Alliance_Conference_2016.pdf"},{"id":12926,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Security_Sector_Reform_In_Ukraine_2016.pdf"},{"id":12925,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Thought_Leadership_Programme_2016.pdf"},{"id":12924,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_The_Moral_Component_Of_Cross_Domain_Conflict_2016.pdf"},{"id":12923,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_A_Framework_For_Exploring_Cybersecurity_Policy_Options_2016.pdf"},{"id":12922,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_It_Takes_More_Than_Offensive_Capability_To_Have_An_Effective_Cyberdeterrence_Posture_2017.pdf"},{"id":12921,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Tactical_Cyber_2017.pdf"},{"id":12920,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_The_Weaponization_Of_Information_2017.pdf"},{"id":12919,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Stateless_Attribution_2017.pdf"},{"id":12918,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Cyber_Power_Potential_Of_The_Armys_Reserve_Component_2017.pdf"},{"id":12917,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Behind_The_Curtain_2017.pdf"},{"id":12916,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Exploring_Cyber_Security_Policy_Options_In_Australia_2017.pdf"},{"id":12915,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Retaining_The_Armys_Cyber_Expertise_2017.pdf"},{"id":12914,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Law_Enforcement_Cyber_Center_2017.pdf"},{"id":12913,"document":"https:\/\/cyentia.comhttps:\/\/cyentia.com\/wp-content\/uploads\/RAND_Estimating_The_Global_Cost_Of_Cyber_Risk_2018.pdf"}]