Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cisco

Below you will find reports with the source of “Cisco”

image from Cisco 2018 Annual Cyber Security Report: At-a-Glance - Cloud Security

Cisco 2018 Annual Cyber Security Report: At-a-Glance - Cloud Security

A focused subset of Cisco’s 2018 full Cyber Security Report, focusing on cloud security practices.

Added: February 17, 2020
image from 2019 Threat Report

2019 Threat Report

A long form narrative on several threat trends seen in recent months.

Added: February 14, 2020
image from Consumer Privacy Survey

Consumer Privacy Survey

This is a survey conducted by Cisco, mainly talking about their findings that people care about privacy, and a surprisingly large number have already taken actions to protect it.

(more available)
Added: February 9, 2020
image from Email: Click with Caution

Email: Click with Caution

This report offers insights into the 40 year history of spam. It discusses what this means for business, and how the new spam has surpassed the spam of 40 years ago.

(more available)
Added: July 10, 2019
image from Defending Against Today's Critical Threats: A 2019 Threat Report

Defending Against Today's Critical Threats: A 2019 Threat Report

As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future.

(more available)
Added: May 3, 2019
image from Anticipating The Unkowns: Chief Information Security Officer (CISO) Benchmark Study

Anticipating The Unkowns: Chief Information Security Officer (CISO) Benchmark Study

This report reveals findings around the cybersecurity landscape. To inform this report they surveyed ,3,200 security leaders asking questions in three categories, Set Up - how do you set yourself up for success, Architecture - what is your approach to vender/solution selection, and finally Breach Readiness and Response.

(more available)
Added: March 6, 2019
image from Cisco 2018 Privacy Maturity Benchmark Study

Cisco 2018 Privacy Maturity Benchmark Study

The Cisco 2018 Privacy Maturity Benchmark Study was created in conjunction with Cisco’s Annual Cybersecurity Benchmark Study, a double-blind survey completed by more than 3600 security professional in 25 countries and across all major industries. The privacy specific questions focused on a subset of nearly 3000 respondents who were familiar with the privacy processes at their organizations. Participants were asked about the makeup of their privacy teams, maturity level of their privacy processes, and the impact (if any) they experienced related to delays in the sales cycle due to customer data privacy concerns. We also analyzed responses to other questions regarding cyber events to understand which organizations had been breached in the last year and the size of any losses from these events.

(more available)
Added: February 12, 2019
image from Cisco Cybersecurity Series January 2019: Maximizing the value of your data privacy investments

Cisco Cybersecurity Series January 2019: Maximizing the value of your data privacy investments

The findings from this study provide strong evidence that organizations are benefitting from their privacy investments beyond compliance. Organizations that are ready for GDPR are experiencing shorter delays in their sales cycle related to customers’ data privacy concerns than those that are not ready for GDPR. GDPR-ready organizations have also experienced fewer data breaches, and when breaches have occurred, fewer records were impacted, and system downtime was shorter. As a result, the total cost of data breaches was less than what organizations not ready for GDPR experienced.

(more available)
Added: February 6, 2019
image from Small And Mighty

Small And Mighty

This special report provides a deep dive into the cybersecurity practices of small and midmarket businesses.

Added: November 20, 2018
image from 2018 Annual Cybersecurity Report

2018 Annual Cybersecurity Report

In the executive summary, this report asks, “What if defenders could see the future?” it then goes on to say that defenders can see what’s on the horizon and many clues are out there and obvious. The entire report seeks to outline ways in which defenders can see the future.

(more available)
Added: October 26, 2018
image from 2017 Annual Security Report

2017 Annual Security Report

The Annual Cybersecurity Report highlights the relentless push-and-pull dynamic between cyber attackers and cyber defenders. It is intended to help organizations respond effectively to today’s rapidly evolving and sophisticated threats.

(more available)
Added: October 25, 2018
image from 2016 Annual Security Report

2016 Annual Security Report

This report can help you learn how to become more resilient to new attacks and compete more safely in the digital age.

(more available)
Added: October 24, 2018
image from Visual Networking Index: Forecast and Methodology, 2016-2021

Visual Networking Index: Forecast and Methodology, 2016-2021

This paper takes a look at networking and analyzes what can be expected and what will happen in the future.

(more available)
Added: October 17, 2018
image from Midyear Security Report 2015

Midyear Security Report 2015

Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.

(more available)
Added: October 16, 2018
image from 2017 Midyear Cybersecurity Report

2017 Midyear Cybersecurity Report

This midyear report details two dynamics undermining the successes of the cybersecurity landscape. “Our security experts are becoming increasingly concerned about the accelerating pace of change—and yes, sophistication—in the global cyber threat landscape. That is not to say defenders are not improving their ability to detect threats and prevent attacks, or to help users and organizations avoid or recover more quickly from them. But we see two dynamics undermining their hard-won successes, hindering further progress, and helping to usher in a new era of cyber risks and threats…”

(more available)
Added: October 15, 2018
image from Evolution Of Cloud In Education

Evolution Of Cloud In Education

Vector Consulting was commissioned by Cisco Australia and New Zealand to better understand the role and impact of cloud in higher education and training. For the purposes of this report `cloud’ is predominantly focused on infrastructure as a service or cloud-based infrastructure. The study included desktop research, targeted interviews and a comprehensive survey, which forms the basis for this report. The survey was distributed electronically to Australian and New Zealand institutions to better understand their current views about where cloud was having the most impact and how they were planning for cloud. The survey was in field for two weeks and all individual responses were provided.

(more available)
Added: October 14, 2018
image from Intent-Based Networking And Extending The Enterprise

Intent-Based Networking And Extending The Enterprise

Cisco provides a brief report that discusses intent based networking and the enterprise.

Added: October 14, 2018
image from The Explosion Of Apps: 27% Are Risky

The Explosion Of Apps: 27% Are Risky

This report seeks to outline the potential problems related to apps that are allowed to have access to corporate networks and servers.

(more available)
Added: October 14, 2018
image from Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience.

(more available)
Added: October 13, 2018
image from The Cloud Threat Funnel: Suspicious User Behavior That Matters

The Cloud Threat Funnel: Suspicious User Behavior That Matters

For this cybersecurity report, the Cloudlock CyberLab analyzed daily behavior across 10 million users, 1 billion files, and 101,000 apps to surface insightful trends and help organizations detect signs of threat. On the following pages, we’ll walk you through the CyberLab’s Cloud Threat Funnel, designed to help security teams narrow their focus onto user activities that are the most indicative of true threat.

(more available)
Added: October 13, 2018
image from 2015 Annual Security Report

2015 Annual Security Report

The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 08:08 UTC (build b1d7be4)