Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

SANS

Below you will find reports with the source of “SANS”

image from Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey

Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey

A survey of 450 individuals on cybersecurity spending plans, areas of investment, and workforce requirements.
Added: July 22, 2020
image from 2020 SANS Automation and Integration Survey

2020 SANS Automation and Integration Survey

Automation and integration is often hailed as a great enabler for the future. This survey identified how respondents are adopting systems, where their systems currently stand and what is on the planning horizon. (more available)
Added: May 21, 2020
image from 2020 SANS Cyber Threat Intelligence (CTI) Survey

2020 SANS Cyber Threat Intelligence (CTI) Survey

A lot of progress has been made in the past few years around requirements. Next steps in this area include identifying when and why to update intelligence requirements—even ad hoc adjustments can be planned for by identifying the circumstances under which they would need to be changed. (more available)
Added: May 11, 2020
image from Securing industrial Control Systems- 2017

Securing industrial Control Systems- 2017

We annually gather and analyze raw data from hundreds of IT and industrial control systems (ICS) security practitioners across a variety of industries, people whose work places them in positions of responsibility to identify risks and safeguard control systems and networks from malicious and accidental actions. (more available)
Added: February 18, 2020
image from Common and Best Practices for Security Operations Centers: Results of the 2019 Survey

Common and Best Practices for Security Operations Centers: Results of the 2019 Survey

A survey of over 300 security professionals on security operations center (SOC) practices and how those practices relate to outcomes.
Added: November 25, 2019
image from Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey

Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey

This 2019 edition of the SANS Security Operations Center (SOC) Survey was designed to provide objective data to security leaders and practitioners who are looking to establish a SOC or optimize their existing SOCs. (more available)
Added: October 1, 2019
image from The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

This year’s SANS survey saw an increase in usage and interest in CTI, along with a diversification in how the intelligence is being used by organizations. (more available)
Added: May 18, 2019
image from 2019 SANS Automation & Integration Survey

2019 SANS Automation & Integration Survey

Automation balances machine-based analysis with human-based domain knowledge to help organizations achieve optimal workflows in the face of staff shortages and alert fatigue, all caused by an increasing number of destructive threats. (more available)
Added: April 19, 2019
image from 2018 Secure DevOps: Fact Or Fiction?

2018 Secure DevOps: Fact Or Fiction?

This survey, the sixth in a series of annual studies by SANS on security practices in software development, is the first to explicitly focus on DevOps. (more available)
Added: January 16, 2019
image from 2018 SANS Security Awareness Report

2018 SANS Security Awareness Report

This report analyzes the data submitted by 1,718 security awareness professionals from around the world to identify and benchmark how organizations are managing their human cyber security risk. (more available)
Added: November 6, 2018
image from SANS 2018 Security Operations Center Survey: The Definition of SOC-cess?

SANS 2018 Security Operations Center Survey: The Definition of SOC-cess?

This report is based on a survey, that is intended to provide a community perspective on what security operations centers (SOCs) look like within organizations across the globe, as well as data and guidance to enable organizations to build, manage, maintain and mature effective and efficient SOCs. (more available)
Added: October 26, 2018
image from SANS Survey on Security Optimization

SANS Survey on Security Optimization

This report discusses the proper workflows in Security Optimization.
Added: October 25, 2018
image from 2017 Security Operations Center Survey

2017 Security Operations Center Survey

This report discusses the Security Operations Center and how it is being architected in organizations with some consensus on what should be done. (more available)
Added: October 24, 2018
image from Next-Gen Endpoint Risks And Protections: A SANS Survey

Next-Gen Endpoint Risks And Protections: A SANS Survey

This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. (more available)
Added: October 23, 2018
image from Sensitive Data At Risk:The SANS 2017 Data Protection Survey

Sensitive Data At Risk:The SANS 2017 Data Protection Survey

This report is based on a survey that sought to see how organizations were protecting their data.
Added: October 22, 2018
image from Incident Response Survey 2017

Incident Response Survey 2017

From the report, “In the following pages, we examine the results of the survey in detail and offer guidelines and feedback on how our industry can continue to improve. (more available)
Added: October 21, 2018
image from DDoS Attacks Advancing and Enduring: A SANS Survey

DDoS Attacks Advancing and Enduring: A SANS Survey

Distributed denial of service (DDoS) attacks continue to grow in frequency, sophistication and bandwidth. Due to a recent SANS survey, 378 security and network managers reveal that they are experiencing more frequent and sophisticated DDoS attacks These and other trends are discussed in the rest of this report. (more available)
Added: October 20, 2018
image from Cloud Security Defense: In Detail If Not In Depth

Cloud Security Defense: In Detail If Not In Depth

This report discusses the results of a survey conducted in 2017 to determine what information, concerns and security choices organizations are making with the cloud and the security of the cloud. (more available)
Added: October 19, 2018
image from Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

The aim of this paper is to establish a database on studies, articles and working papers on cyber risk and cyber risk insurance. (more available)
Added: October 18, 2018
image from 2017 Security Awareness Report

2017 Security Awareness Report

During the research for this report, two key findings were discovered that uncovered why awareness programs thrive or fail.
Added: October 17, 2018
image from Under Threat or Compromise

Under Threat or Compromise

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape. (more available)
Added: October 14, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2021
Library updated: March 5, 2021 12:07 UTC (build 7e736b2)