December 17, 2024InAnalysis Unmasking the Human Risk: Why Salespeople and Executives Are Prime Phishing Targets
August 13, 2024InAnalysis Unlocking the Global Impact of Ransomware: Insights from the IRIS Ransomware Report
August 5, 2024InIRIS, News, Press Releases Press Release: Information Risk Insights Study - Ransomware
July 31, 2024InNews, Press Releases, Report Press Release: A Visual Exploration of Exploits in the Wild - The Inaugural Study of EPSS Data and Performance
July 19, 2024InAnalysis, IRIS Vulnerability at the Crossroads – Ransomware in Education and Transportation
May 2, 2024InNews Cyentia Institute Named A Contributor to Verizon's 2024 Data Breach Investigations Report (DBIR)
March 15, 2024InNews, Report Tags:EPSS, exploitation, Vulnerability management, Vulnerability remediationCall for Sponsors: Inaugural Exploit Prediction Annual Report
February 15, 2024InAnalysis Enhanced Marketing Strategies: Cyentia's Insights for Healthcare and Recent Cybersecurity Incidents
February 12, 2024InAnalysis Transforming Cyber Threat Intelligence into Security Action with MITRE ATT&CK
February 9, 2024InAnalysis, IRIS Tags:cyber risk, cyber risk management, cyber risk quantification, impact, incidents, Loss Event Frequency, Loss magnitude, losses, resilienceCall for Sponsors: Sector-Focused Risk Retina
January 23, 2024InAnalysis Cyber Risk in Healthcare: A Comprehensive Analysis with IRIS Risk Retina for the Healthcare Sector
December 13, 2023InAnalysis Enhance Your Risk Management: Exploring Nth-Party Complexities in Our Latest Report
November 27, 2023InAnalysis, Report Exploring Insights from "Multi-Source Analysis of Top MITRE ATT&CK Techniques"
October 20, 2023InAnalysis Understanding Threats with the Information Risk Insights Study's Risk Retina Threat Event Analysis
October 16, 2023InAnalysis Exploring Common Attack Techniques, Their Impact in Cybersecurity & the Criticality of Expert Analysis
September 29, 2023InIRIS, Press Releases, Report Press Release: Information Risk Insights Study (IRIS) Risk Retina® Threat Event Analysis
September 28, 2023InAnalysis Does Cyber Threat Intelligence Raise Our Intelligence? Unveiling the Surprising Connection
September 13, 2023InIRIS, News Cybersecurity Unleashed: A Powerful Partnership to 'Byte' at the Threats Together!
August 30, 2023InIRIS, News, Press Releases Axio and Cyentia Institute Partner, Enhancing Data-Driven Cyber Risk Quantification for Organizations Across the Globe
August 7, 2023InPress Releases, Report Prioritization to Prediction, Vol. 9: Role of the known exploited vulnerability catalog in risk-based vulnerability management
July 19, 2023InAnalysis Enhancing Threat-Driven Remediation: Prioritizing Vulnerabilities with Exploit Intelligence
July 18, 2023InAnalysis Tags:dataviz, Research, Security vulnerabilities, twitterThe Death of Infosec Twitter
June 26, 2023InIRIS, Report Strengthening Healthcare Security: Optimizing Vulnerability Remediation with IRIS Risk Retina
June 19, 2023InAnalysis The Hidden Complexity of Vulnerability Remediation: Bridging the Gap between Data and Common Advice
June 9, 2023InAnalysis Quantify, Analyze, Protect: IRIS Risk Retina Reports for Effective Cyber Risk Management
June 5, 2023InPress Releases, Report New Research: Close Encounters of the Third & Fourth Party Kind Subsector Reports
May 25, 2023InAnalysis, Report Tags:Attack path analysis, attack paths, choke points, Cost of Attack, Exposure management, Prioritization, Vulnerability remediationVisualizing the Value of Attack Path Choke Points for Prioritization
April 10, 2023InPress Releases New Research: Navigating the Paths of Risk - The State of Exposure Management in 2023
February 28, 2023InAnalysis Tags:3rd party risk, 3rd party security, supply chain risk, supply chain security, third party security, third-party riskSupply Chain Multiplicity: Not as sharp as the original
February 14, 2023InPress Releases New Webinar: Elevate Security and Cyentia Institute Release Third Annual Research Study on User Risk
January 26, 2022InAnalysis, Report Tags:cyber risk, cybersecurity, Information Risk Insights Study, information security, iris, supply chain, third-party riskBridging 18y Studying Cyber Risk in Supply Chains
January 3, 2022InAnalysis Cisco Security Outcomes Study Methodology Post II: The Rise of Item Response Theory
December 23, 2021InAnalysis Tags:cyber loss events, cybersecurity, Cyentia, Cyentia Library, iris, Meta-analysis, Prediction, Prioritization, Vulnerability management, Vulnerability remediationLooking Back on 2021
November 30, 2021InAnalysis Tags:Cisco, cybersecurity, Methodology, Security Outcomes StudyCisco Security Outcomes Study methodology post! Attention Stats Nerds!
October 26, 2021InPress Releases Tags:breaches, cyber loss events, incidents, iris, Risk, supply chainCyentia Institute Publishes IRIS Tsunami: Lessons from 50 of the largest multi-party cyber incidents
October 26, 2021InAnalysis, Report Tags:breaches, cyber loss events, incidents, iris, Risk, supply chainIRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents
October 14, 2021InAnalysis Tags:breaches, cyber loss events, incidents, reportRevisiting the Ripple Effect in Breaches - What's Making Waves in 2021?
June 28, 2021InAnalysis, Report Tags:human attack surface, human risk, human threat, insider risk, insider threat, phishing, security training, user awareness trainingSalving Human Risk in Cybersecurity
January 21, 2021InAnalysis, Report Tags:exploitation, patching, Vulnerability management, Vulnerability remediationI Once Called Vuln Researchers NVPs; Are They MVPs Instead?
December 10, 2020InAnalysis, Report Tags:application security, devops, devsecops, software security, State of Software Security, survival analysisWhat Matters More in Software Security - Nature or Nurture?
November 20, 2020InNews, Report Tags:breaches, cyber loss events, incidents, iris, losses, xtremeIRIS 20/20 Xtreme Webinar - Audience Questions
November 10, 2020InPress Releases Cyentia Institute Publishes IRIS Xtreme on the 100 Largest Cyber Loss Events
April 15, 2020InNews, Report Tags:breaches, cyber loss events, incidents, iris, lossesIRIS 20/20 Webinar - Audience Questions
April 14, 2020InNews Tags:breaches, cyber loss events, incidents, lossesSeeking Sponsor for Study on Extreme Cyber Loss Events
March 18, 2020InPress Releases Cyentia Institute Publishes Groundbreaking Research on the Frequency and Cost of Breaches
April 19, 2019InAnalysis Tags:Data visualization, dataviz, RiskTernary plots for visualizing (some types of) 3D data
April 19, 2019InNews Tags:Ben Edwards, Benjamin Edwards, Biography, Cyentia, data science, Deep Learning, Machine LearningIntroducing Cyentia's new data scientist
March 12, 2019InReport Tags:Data visualization, dataviz, Prediction, Prioritization, Remediation capacity, Resource constraints, Security vulnerabilities, Vulnerability management, Vulnerability remediationPrioritization to Prediction, Vol 3: Wade’s Take
February 12, 2018InPress Releases Tags:Analyst, Automation, CIRT, Collaboration, Forensics, Incident response, Orchestration, Satisfaction, Security operations, Security tools, SOC, Survey, Threat detection, Threat hunting, Threat intelligence, Threat monitoring, TrainingNew Research: Voice of the Analyst Study
February 8, 2018InPress Releases Tags:cybersecurity, Cybersecurity industry, Cyentia Library, InfoSec market, Natural Language Processing, NLP, RSA Conference, TrendsNew Research: Striking Security Gold
January 16, 2018InNews Tags:Board of Directors, CISO, Governance, Metrics, Reporting, RiskCall for Participation: 2018 Cyber Balance Sheet
July 25, 2017InAnalysis Tags:Beta distribution, Confidence interval, Contact Frequency, Extortion, FAIR framework, Loss Event Frequency, Meta-analysis, Prevalence, Probability of Action, Ransomware, Sampling, Threat Capability, Threat Event Frequency, WeightingMeasuring Ransomware, Part 3: Prevalence
July 11, 2017InAnalysis Tags:Confidence interval, Extortion, Loss exceedance, Loss magnitude, Meta-analysis, Ransomware, SamplingMeasuring Ransomware, Part 2: Ransom Demands
July 5, 2017InAnalysis Tags:Confidence interval, Extortion, Meta-analysis, Ransomware, SamplingMeasuring Ransomware, Part 1: Payment Rate
December 17, 2024InAnalysis Unmasking the Human Risk: Why Salespeople and Executives Are Prime Phishing Targets
August 13, 2024InAnalysis Unlocking the Global Impact of Ransomware: Insights from the IRIS Ransomware Report
July 19, 2024InAnalysis, IRIS Vulnerability at the Crossroads – Ransomware in Education and Transportation
February 15, 2024InAnalysis Enhanced Marketing Strategies: Cyentia's Insights for Healthcare and Recent Cybersecurity Incidents
February 12, 2024InAnalysis Transforming Cyber Threat Intelligence into Security Action with MITRE ATT&CK
February 9, 2024InAnalysis, IRIS Tags:cyber risk, cyber risk management, cyber risk quantification, impact, incidents, Loss Event Frequency, Loss magnitude, losses, resilienceCall for Sponsors: Sector-Focused Risk Retina
January 23, 2024InAnalysis Cyber Risk in Healthcare: A Comprehensive Analysis with IRIS Risk Retina for the Healthcare Sector
December 13, 2023InAnalysis Enhance Your Risk Management: Exploring Nth-Party Complexities in Our Latest Report
November 27, 2023InAnalysis, Report Exploring Insights from "Multi-Source Analysis of Top MITRE ATT&CK Techniques"
October 20, 2023InAnalysis Understanding Threats with the Information Risk Insights Study's Risk Retina Threat Event Analysis
October 16, 2023InAnalysis Exploring Common Attack Techniques, Their Impact in Cybersecurity & the Criticality of Expert Analysis
September 28, 2023InAnalysis Does Cyber Threat Intelligence Raise Our Intelligence? Unveiling the Surprising Connection
July 19, 2023InAnalysis Enhancing Threat-Driven Remediation: Prioritizing Vulnerabilities with Exploit Intelligence
July 18, 2023InAnalysis Tags:dataviz, Research, Security vulnerabilities, twitterThe Death of Infosec Twitter
June 19, 2023InAnalysis The Hidden Complexity of Vulnerability Remediation: Bridging the Gap between Data and Common Advice
June 9, 2023InAnalysis Quantify, Analyze, Protect: IRIS Risk Retina Reports for Effective Cyber Risk Management
May 25, 2023InAnalysis, Report Tags:Attack path analysis, attack paths, choke points, Cost of Attack, Exposure management, Prioritization, Vulnerability remediationVisualizing the Value of Attack Path Choke Points for Prioritization
February 28, 2023InAnalysis Tags:3rd party risk, 3rd party security, supply chain risk, supply chain security, third party security, third-party riskSupply Chain Multiplicity: Not as sharp as the original
January 26, 2022InAnalysis, Report Tags:cyber risk, cybersecurity, Information Risk Insights Study, information security, iris, supply chain, third-party riskBridging 18y Studying Cyber Risk in Supply Chains
January 3, 2022InAnalysis Cisco Security Outcomes Study Methodology Post II: The Rise of Item Response Theory
December 23, 2021InAnalysis Tags:cyber loss events, cybersecurity, Cyentia, Cyentia Library, iris, Meta-analysis, Prediction, Prioritization, Vulnerability management, Vulnerability remediationLooking Back on 2021
November 30, 2021InAnalysis Tags:Cisco, cybersecurity, Methodology, Security Outcomes StudyCisco Security Outcomes Study methodology post! Attention Stats Nerds!
October 26, 2021InAnalysis, Report Tags:breaches, cyber loss events, incidents, iris, Risk, supply chainIRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents
October 14, 2021InAnalysis Tags:breaches, cyber loss events, incidents, reportRevisiting the Ripple Effect in Breaches - What's Making Waves in 2021?
June 28, 2021InAnalysis, Report Tags:human attack surface, human risk, human threat, insider risk, insider threat, phishing, security training, user awareness trainingSalving Human Risk in Cybersecurity
January 21, 2021InAnalysis, Report Tags:exploitation, patching, Vulnerability management, Vulnerability remediationI Once Called Vuln Researchers NVPs; Are They MVPs Instead?
December 10, 2020InAnalysis, Report Tags:application security, devops, devsecops, software security, State of Software Security, survival analysisWhat Matters More in Software Security - Nature or Nurture?
April 19, 2019InAnalysis Tags:Data visualization, dataviz, RiskTernary plots for visualizing (some types of) 3D data
July 25, 2017InAnalysis Tags:Beta distribution, Confidence interval, Contact Frequency, Extortion, FAIR framework, Loss Event Frequency, Meta-analysis, Prevalence, Probability of Action, Ransomware, Sampling, Threat Capability, Threat Event Frequency, WeightingMeasuring Ransomware, Part 3: Prevalence
July 11, 2017InAnalysis Tags:Confidence interval, Extortion, Loss exceedance, Loss magnitude, Meta-analysis, Ransomware, SamplingMeasuring Ransomware, Part 2: Ransom Demands
July 5, 2017InAnalysis Tags:Confidence interval, Extortion, Meta-analysis, Ransomware, SamplingMeasuring Ransomware, Part 1: Payment Rate
August 5, 2024InIRIS, News, Press Releases Press Release: Information Risk Insights Study - Ransomware
July 19, 2024InAnalysis, IRIS Vulnerability at the Crossroads – Ransomware in Education and Transportation
February 9, 2024InAnalysis, IRIS Tags:cyber risk, cyber risk management, cyber risk quantification, impact, incidents, Loss Event Frequency, Loss magnitude, losses, resilienceCall for Sponsors: Sector-Focused Risk Retina
September 29, 2023InIRIS, Press Releases, Report Press Release: Information Risk Insights Study (IRIS) Risk Retina® Threat Event Analysis
September 13, 2023InIRIS, News Cybersecurity Unleashed: A Powerful Partnership to 'Byte' at the Threats Together!
August 30, 2023InIRIS, News, Press Releases Axio and Cyentia Institute Partner, Enhancing Data-Driven Cyber Risk Quantification for Organizations Across the Globe
June 26, 2023InIRIS, Report Strengthening Healthcare Security: Optimizing Vulnerability Remediation with IRIS Risk Retina
August 5, 2024InIRIS, News, Press Releases Press Release: Information Risk Insights Study - Ransomware
July 31, 2024InNews, Press Releases, Report Press Release: A Visual Exploration of Exploits in the Wild - The Inaugural Study of EPSS Data and Performance
May 2, 2024InNews Cyentia Institute Named A Contributor to Verizon's 2024 Data Breach Investigations Report (DBIR)
March 15, 2024InNews, Report Tags:EPSS, exploitation, Vulnerability management, Vulnerability remediationCall for Sponsors: Inaugural Exploit Prediction Annual Report
September 13, 2023InIRIS, News Cybersecurity Unleashed: A Powerful Partnership to 'Byte' at the Threats Together!
August 30, 2023InIRIS, News, Press Releases Axio and Cyentia Institute Partner, Enhancing Data-Driven Cyber Risk Quantification for Organizations Across the Globe
November 20, 2020InNews, Report Tags:breaches, cyber loss events, incidents, iris, losses, xtremeIRIS 20/20 Xtreme Webinar - Audience Questions
April 15, 2020InNews, Report Tags:breaches, cyber loss events, incidents, iris, lossesIRIS 20/20 Webinar - Audience Questions
April 14, 2020InNews Tags:breaches, cyber loss events, incidents, lossesSeeking Sponsor for Study on Extreme Cyber Loss Events
April 19, 2019InNews Tags:Ben Edwards, Benjamin Edwards, Biography, Cyentia, data science, Deep Learning, Machine LearningIntroducing Cyentia's new data scientist
January 16, 2018InNews Tags:Board of Directors, CISO, Governance, Metrics, Reporting, RiskCall for Participation: 2018 Cyber Balance Sheet
August 5, 2024InIRIS, News, Press Releases Press Release: Information Risk Insights Study - Ransomware
July 31, 2024InNews, Press Releases, Report Press Release: A Visual Exploration of Exploits in the Wild - The Inaugural Study of EPSS Data and Performance
September 29, 2023InIRIS, Press Releases, Report Press Release: Information Risk Insights Study (IRIS) Risk Retina® Threat Event Analysis
August 30, 2023InIRIS, News, Press Releases Axio and Cyentia Institute Partner, Enhancing Data-Driven Cyber Risk Quantification for Organizations Across the Globe
August 7, 2023InPress Releases, Report Prioritization to Prediction, Vol. 9: Role of the known exploited vulnerability catalog in risk-based vulnerability management
June 5, 2023InPress Releases, Report New Research: Close Encounters of the Third & Fourth Party Kind Subsector Reports
April 10, 2023InPress Releases New Research: Navigating the Paths of Risk - The State of Exposure Management in 2023
February 14, 2023InPress Releases New Webinar: Elevate Security and Cyentia Institute Release Third Annual Research Study on User Risk
October 26, 2021InPress Releases Tags:breaches, cyber loss events, incidents, iris, Risk, supply chainCyentia Institute Publishes IRIS Tsunami: Lessons from 50 of the largest multi-party cyber incidents
November 10, 2020InPress Releases Cyentia Institute Publishes IRIS Xtreme on the 100 Largest Cyber Loss Events
March 18, 2020InPress Releases Cyentia Institute Publishes Groundbreaking Research on the Frequency and Cost of Breaches
February 12, 2018InPress Releases Tags:Analyst, Automation, CIRT, Collaboration, Forensics, Incident response, Orchestration, Satisfaction, Security operations, Security tools, SOC, Survey, Threat detection, Threat hunting, Threat intelligence, Threat monitoring, TrainingNew Research: Voice of the Analyst Study
February 8, 2018InPress Releases Tags:cybersecurity, Cybersecurity industry, Cyentia Library, InfoSec market, Natural Language Processing, NLP, RSA Conference, TrendsNew Research: Striking Security Gold
July 31, 2024InNews, Press Releases, Report Press Release: A Visual Exploration of Exploits in the Wild - The Inaugural Study of EPSS Data and Performance
March 15, 2024InNews, Report Tags:EPSS, exploitation, Vulnerability management, Vulnerability remediationCall for Sponsors: Inaugural Exploit Prediction Annual Report
November 27, 2023InAnalysis, Report Exploring Insights from "Multi-Source Analysis of Top MITRE ATT&CK Techniques"
September 29, 2023InIRIS, Press Releases, Report Press Release: Information Risk Insights Study (IRIS) Risk Retina® Threat Event Analysis
August 7, 2023InPress Releases, Report Prioritization to Prediction, Vol. 9: Role of the known exploited vulnerability catalog in risk-based vulnerability management
June 26, 2023InIRIS, Report Strengthening Healthcare Security: Optimizing Vulnerability Remediation with IRIS Risk Retina
June 5, 2023InPress Releases, Report New Research: Close Encounters of the Third & Fourth Party Kind Subsector Reports
May 25, 2023InAnalysis, Report Tags:Attack path analysis, attack paths, choke points, Cost of Attack, Exposure management, Prioritization, Vulnerability remediationVisualizing the Value of Attack Path Choke Points for Prioritization
January 26, 2022InAnalysis, Report Tags:cyber risk, cybersecurity, Information Risk Insights Study, information security, iris, supply chain, third-party riskBridging 18y Studying Cyber Risk in Supply Chains
October 26, 2021InAnalysis, Report Tags:breaches, cyber loss events, incidents, iris, Risk, supply chainIRIS Tsunami - Lessons from 50 of the largest multi-party cyber incidents
June 28, 2021InAnalysis, Report Tags:human attack surface, human risk, human threat, insider risk, insider threat, phishing, security training, user awareness trainingSalving Human Risk in Cybersecurity
January 21, 2021InAnalysis, Report Tags:exploitation, patching, Vulnerability management, Vulnerability remediationI Once Called Vuln Researchers NVPs; Are They MVPs Instead?
December 10, 2020InAnalysis, Report Tags:application security, devops, devsecops, software security, State of Software Security, survival analysisWhat Matters More in Software Security - Nature or Nurture?
November 20, 2020InNews, Report Tags:breaches, cyber loss events, incidents, iris, losses, xtremeIRIS 20/20 Xtreme Webinar - Audience Questions
April 15, 2020InNews, Report Tags:breaches, cyber loss events, incidents, iris, lossesIRIS 20/20 Webinar - Audience Questions
March 12, 2019InReport Tags:Data visualization, dataviz, Prediction, Prioritization, Remediation capacity, Resource constraints, Security vulnerabilities, Vulnerability management, Vulnerability remediationPrioritization to Prediction, Vol 3: Wade’s Take