Posts
- And we’re live!
- Application Security and "Typical" Fix Times
- Application Security and Burstiness
- Call for Participation: 2018 Cyber Balance Sheet
- Communicating Risk: Loss Exceedance Curves
- Cyentia Institute Publishes Groundbreaking Research on the Frequency and Cost of Breaches
- Cyentia Institute Publishes IRIS Xtreme on the 100 Largest Cyber Loss Events
- Cyentia Podcast
- Cyentia Starting a Study and Seeking SOCs
- Finally - a properly sampled security survey
- Gain Confidence with Confidence Intervals
- GitHub: A Source for Exploits
- Help Save the Cybersecurity Research Library!
- I Once Called Vuln Researchers NVPs; Are They MVPs Instead?
- Internet Risk Surface in the Financial Sector
- Introducing Cyentia's new data scientist
- Introducing the Cyentia Library
- IRIS 20/20 Webinar - Audience Questions
- IRIS 20/20 Xtreme Webinar - Audience Questions
- Measuring Ransomware, Part 1: Payment Rate
- Measuring Ransomware, Part 2: Ransom Demands
- Measuring Ransomware, Part 3: Prevalence
- New Research: Striking Security Gold
- New Research: Voice of the Analyst Study
- Patching Is *Much* Slower Without Vendor Support
- Prioritization to Prediction, Vol 3: Wade’s Take
- Re-introducing the Cyentia Research Library
- Road to SecOps Maturity study released
- Seeking Sponsor for Study on Extreme Cyber Loss Events
- Survival in Application Security
- Ternary plots for visualizing (some types of) 3D data
- What Matters More in Software Security - Nature or Nurture?
- Who Has the Advantage - Attackers or Defenders?