Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cybersecurity Insiders

Below you will find reports with the source of “Cybersecurity Insiders”

image from Identity and Access Management Report

Identity and Access Management Report

A review of community members opinions on their prioritization for identity access management systems, the challenges implementing these solutions, and the desired capabilities when selecting IAM technologies. (more available)
Added: July 27, 2020
image from 2020 Cloud Security Report

2020 Cloud Security Report

The Cloud Security Report is an annual paper published by ISC(2). It goes in depth on the changing cloud environment as companies continue to rapidly migrate workloads from data centers to the cloud. (more available)
Added: June 25, 2020
image from 2020 Insider Threat Report

2020 Insider Threat Report

The 2020 Insider Threat Report reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders, and how organizations are preparing to better protect their critical data and IT infrastructure. (more available)
Added: February 9, 2020
image from 2019 Malware Report

2019 Malware Report

The 2019 Malware Report was produced by Cybersecurity Insiders and HelpSystems to reveal the latest malware security trends, challenges, and investment priorities. (more available)
Added: July 10, 2019
image from 2018 Cloud Security Report

2018 Cloud Security Report

This report has been produced by the 400,000 member Information Security Community on LinkedIn in partnership with Cybersecurity Insiders to explore how organizations are responding to the security threats in the cloud, and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. (more available)
Added: April 4, 2019
image from Ransomware Report

Ransomware Report

This report offers new insights into ransomware and the issues related to this problem.
Added: April 4, 2019
image from 2018 Application Security Report

2018 Application Security Report

This report is the result of a comprehensive survey of 437 cybersecurity professionals designed to reveal the latest application security trends, how organizations are protecting applications, and what tools and best practices IT cybersecurity teams are prioritizing to find, fix and prevent vulnerabilities in next-gen applications. (more available)
Added: April 4, 2019
image from Mobile Security & BYOD Report

Mobile Security & BYOD Report

Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use in the enterprise. (more available)
Added: April 4, 2019
image from 2018 Endpoint Security Report

2018 Endpoint Security Report

The 2018 Endpoint Security Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing. (more available)
Added: April 4, 2019
image from 2018 Managed Security Report

2018 Managed Security Report

The 2018 Managed Security Report is based on the results of a comprehensive online survey of IT and cybersecurity professionals conducted in July and August of 2018. (more available)
Added: April 4, 2019
image from 2018 Application Security Report

2018 Application Security Report

From the report, “Business applications are critical business resources for companies of all sizes — and they’re increasingly under attack. To gain deeper insights into the state of application security, Cybersecurity Insiders conducted an in-depth study in partnership with the 400,000 member Information Security Community on LinkedIn. (more available)
Added: February 18, 2019
image from 2018 Application Security Report

2018 Application Security Report

This report is based on the results of a comprehensive online survey of 437 cybersecurity professionals conducted from June through August 2018 to gain deep insights into the latest application security threats faced by organizations and the solutions to prevent and remediate them. (more available)
Added: February 12, 2019
image from 2018 Threat Intelligence Report

2018 Threat Intelligence Report

This report takes a look at the threat intelligence of organizations surveyed in 2018. Among the key findings of the report are that organizations are leveraging threat intelligence data for a number of use cases, and many rate themselves fairly competent in their use of threat intelligence to identify and remediate cyber threats. (more available)
Added: February 9, 2019
image from 2019 AWS Cloud Security Report

2019 AWS Cloud Security Report

This report has been produced in partnership with the 400,000 member Cybersecurity Insiders community of IT security professionals to explore how AWS user organizations are responding to security threats in the cloud, and what tools and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. (more available)
Added: February 6, 2019
image from 2019 SIEM Survey Report

2019 SIEM Survey Report

The 2019 SIEM Survey Report represents one of the most comprehensive surveys on SIEM to date, designed to explore the latest trends, key challenges, and solution preferences for SIEM. (more available)
Added: February 6, 2019
image from SIEM Report

SIEM Report

The 2019 SIEM Survey Report represents one of the most comprehensive surveys on SIEM to date, designed to explore the latest trends, key challenges, and solution preferences for SIEM. (more available)
Added: January 31, 2019
image from 2018 Threat Intelligence Report

2018 Threat Intelligence Report

“Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs. (more available)
Added: November 29, 2018
image from 2018 Threat Hunting Report

2018 Threat Hunting Report

This group takes a look at Threat Hunting and examines how organizations are moving to a pro-active approach to cybersecurity.
Added: October 26, 2018
image from Cloud Security Spotlight 2018

Cloud Security Spotlight 2018

Here is a report based on collaboration from a variety of cybersecurity insiders.
Added: October 25, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.
Added: October 18, 2018
image from 2017 Threat Monitoring Report

2017 Threat Monitoring Report

This report is based on a survey of a wide number of cybersecurity professionals, and deals with a variety of issues ranging from the threat landscape to incident recovery. (more available)
Added: October 17, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 00:08 UTC (build 051771c)