Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

3rd Party Services

Below you will find reports with the tag of “3rd Party Services”

image from Scanning the Horizon: How broadening our use of cybersecurity data can help users

Scanning the Horizon: How broadening our use of cybersecurity data can help users

This is the first published study in this field to include SPoF (Single Point of Failure) data, which highlights the dependencies a company has on third-party systems and services. This paper represents a snapshot of our ongoing work exploring what is a deep and highly complex dataset.

(more available)
Added: December 11, 2024
image from Permiso State of Identity Security Report 2024

Permiso State of Identity Security Report 2024

The Permiso Security State of Identity Security Report (2024) offers a comprehensive analysis of cloud identity and access management practices across global organizations. This study, encompassing over 500 entities, unveils critical trends and challenges shaping the future of identity security. 93% of organizations can inventory identities across all environments, as well as track keys, tokens, certificates and any modifications that are made to any environment.

(more available)
Added: November 9, 2024
image from Scanning the Horizon: How broadening our use of cybersecurity data can help insurers

Scanning the Horizon: How broadening our use of cybersecurity data can help insurers

At Gallagher Re, we have been exploring this data’s vast potential for several years. This research has informed the development of a suite of proprietary tools and services aimed at supporting the (re)insurance community in realising the potential of cyber data to enhance underwriting and portfolio monitoring. Principal among these is TIDE, our portfolio quality and benchmarking tool.

(more available)
Added: October 24, 2024
image from 2024 State of AI Security Report

2024 State of AI Security Report

This report focuses on the security of deployed AI models in cloud services and environments. Our research indicates that more than half of organizations have adopted AI models for custom applications. More than half of organizations are deploying their own AI models. Default AI settings are often accepted without regard for security.

(more available)
Added: September 20, 2024
image from The State of Non-Human Identity Security

The State of Non-Human Identity Security

Non-human identities (NHIs) such as bots, API keys, service accounts, OAuth tokens, and secrets are indispensable for automating tasks, enhancing efficiency, and driving innovation within organizations. The survey provides insights into their opinions about their current NHI security, the obstacles they’re facing, and the strategies and tools they’re using. The aim is to shed light on the current state of NHI security and identify areas for improvement.

(more available)
Added: September 16, 2024
image from Global Third-Party Cybersecurity Breaches Report

Global Third-Party Cybersecurity Breaches Report

This report comes at a time when top organizational risks, such as supply chain, cybersecurity, and third-party risks cut across large parts of all organizations. Stopping supply chain attacks requires understanding their causes and the variables that contribute to them. SecurityScorecard threat researchers assist in that effort by helping organizations gauge their overall risk levels and set priorities for vendor vetting.

(more available)
Added: July 23, 2024
image from Sophos 2024 Threat Report

Sophos 2024 Threat Report

Based on that data and Sophos threat research, we see that ransomware continues to have the greatest impact on smaller organizations. But other threats also pose an existential threat to small businesses. Data theft is the focus of most malware targeting small and medium businesses—password stealers, keyboard loggers, and other spyware made up nearly half of malware detections. Email attacks have begun to move away from simple social engineering toward more active engagement with targets over email, using a thread of emails and responses to make their lures more convincing.

(more available)
Added: June 14, 2024
image from 2020 State of the Cloud Report

2020 State of the Cloud Report

The report explores the thinking of 750 global cloud decision-makers and users about the public, private and multi-cloud market. It shares their current and future cloud strategies, often showing year-over-year (YoY) changes to help identify trends. And it offers perspective on how some trends have changed over the years. The survey began in the first quarter of 2020 during the early days of the COVID-19 outbreak spreading outside of China.

(more available)
Added: June 14, 2024
image from 2021 State of the Cloud Report

2021 State of the Cloud Report

This tenth annual Flexera 2021 State of the Cloud Report (previously known as the RightScale State of the Cloud Report) delves into the details of what respondents had to say to reveal what’s happening with all things cloud—from spend allocation to cost management to strategies. Leveraging this data can help IT professionals plan the next steps of their cloud journey. The report explores the thinking of 750 global cloud decision-makers and users about the public, private and multi-cloud market. It shares their current and future cloud strategies, often showing year-over-year (YoY) changes to help identify trends.

(more available)
Added: June 14, 2024
image from 2023 State of Cloud Report

2023 State of Cloud Report

The survey tapped 750 IT professionals and executive leaders worldwide representing a broad cross-section of industries and context areas in the winter of 2022. Flexera sources participants from an independent panel that is rigorously maintained and is comprised of vetted respondents with detailed profiles. At numerous points throughout the report, we’ve provided our own interpretation of the data as Flexera Points of View.

(more available)
Added: June 14, 2024
image from GreyNoise 2022 Mass Exploitation Report

GreyNoise 2022 Mass Exploitation Report

That is the purpose of this report is to show you the hours saved, the data aggregated, and the research methodologies laid bare. you’ll find several sections covering some of the bigger mass exploitations of 2022, also known as celebrity vulnerabilities.

(more available)
Added: June 5, 2024
image from IT and Security Convergence Report 2024

IT and Security Convergence Report 2024

The target population was reached through in-person events, and by third parties via their opt-in email lists, Genetec opt-in email lists, and by digital promotions. This report points out whether answers are from all respondents, end user respondents, or channel partner respondents.

(more available)
Added: May 31, 2024
image from CISA KEV Catalog: Prevalence and Remediation

CISA KEV Catalog: Prevalence and Remediation

CISA created the KEV catalog in part because of challenges that organizations have historically faced in prioritizing vulnerabilities. In any given year, there are tens of thousands of new vulnerabilities. But according to CISA, a study of historical vulnerability data dating back to 2019 shows that less than 4% of all known vulnerabilities were being used by attackers in the wild.

(more available)
Added: May 3, 2024
image from 2024 Secure Cloud Networking Field Report

2024 Secure Cloud Networking Field Report

This survey conducted by Aviatrix explores the trends impacting global cloud, networking, and security practitioners, and how they’re impacting the bottom line for enterprises worldwide. This report will look more closely at the causes and impacts of these findings, as well as recommendations for improving enterprise and industry outcomes in the future.

(more available)
Added: April 22, 2024
image from Utilizing counterfactual analysis to understand cyber risk

Utilizing counterfactual analysis to understand cyber risk

This paper explores the benefits of counterfactual analysis for cyber (re)insurers and provides a framework that can help exposure risk managers, actuaries, and catastrophe modelers incorporate it into their standard suite of risk assessment tools. The paper also contains some worked examples of cyber counterfactual analysis that Gallagher Re has conducted in collaboration with CyberCube.

(more available)
Added: April 18, 2024
image from H2 2022 State of the Cybersecurity Attack Surface

H2 2022 State of the Cybersecurity Attack Surface

The report stated that “Equifax lacked a comprehensive IT asset inventory, meaning it lacked a complete understanding of the assets it owned. This made it difficult, if not impossible, for Equifax to know if vulnerabilities existed on its networks. If a vulnerability cannot be found, it cannot be patched.” The Equifax case is one example of an existential and underreported cybersecurity issue: the vast majority of organizations do not have comprehensive visibility of every asset they need to secure.

(more available)
Added: April 6, 2024
image from State of the Cybersecurity Attack Surface - October 2023

State of the Cybersecurity Attack Surface - October 2023

In our third State of the Cybersecurity Attack Surface report, we continue to see enterprises struggle with many of the same issues they’ve been grappling with—they are blind to IT assets missing endpoint protection, patch management, and, as we now include in this report, vulnerability management. “Stale” IT assets continue to proliferate across corporate networks. Organizations are unnecessarily paying for unused licenses while facing budget cuts and economic challenges.

(more available)
Added: April 6, 2024
image from The State of Third-Party Risk Management

The State of Third-Party Risk Management

This new study makes it clear that enterprise demands have certainly continued to grow since then. Organizations place greater strategic priority on TPRM to contribute to a widening scope of enterprise risk that extends beyond cybersecurity. It’s also clear from these results that supply chains are expanding as is the need to efficiently assess risk across those business relationships. Respondents tell us they’re increasingly relying on automated assessments and risk ratings to meet that demand.

(more available)
Added: April 3, 2024
image from 11th Edition : 2024 Data Breach Industry Forecast

11th Edition : 2024 Data Breach Industry Forecast

In our 11th annual Data Breach Industry Forecast, we looked more broadly than ever before at trends and data on a global scale as data breaches have no borders. This, along with the fact that nationstate-sponsored gangs and attacks are becoming increasingly more strategic and purposeful due to political conflicts or interests, made it fitting to expand our lens. Our predictions come from Experian’s long history of helping companies navigate breaches over the past 21 years. Here’s where we expect to see some hard to believe, but possible developments in the world of data security incidents in 2024.

(more available)
Added: February 3, 2024
image from Cyber attack readiness report 2023

Cyber attack readiness report 2023

To help businesses measure cyber attack readiness, we analyzed performance data from the 982 corporate security teams and 5,117 professionals who participated in our global CTF competition. HTB Business CTF: The Great Escape featured over 30 hacking challenges based on the live threat landscape covering areas such as forensics, blockchain, cloud, and more.

(more available)
Added: December 19, 2023
image from Voice of a Threat Hunter

Voice of a Threat Hunter

This report helps uncover vulnerabilities missed by traditional security tools and detect unnoticed malicious activities. To understand how security professionals utilize threat hunting, we surveyed 218 security analysts to identify effective strategies, challenges, and metrics for success.

(more available)
Added: November 14, 2023
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 16:09 UTC (build b1d7be4)