Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

3rd Party Services

Below you will find reports with the tag of “3rd Party Services”

image from SolarWindws Public Sector Cybersecurity Survey Report

SolarWindws Public Sector Cybersecurity Survey Report

A survey of 400 public sector IT decision makers and influencers to determine challenges faced by public sector IT professionals, security threats, and cybersecurity capabilities.

(more available)
Added: July 22, 2020
image from 2020 Cloud Misconfigurations Report

2020 Cloud Misconfigurations Report

DivvyCloud researchers compiled this report to substantiate the growing trend of breaches caused by cloud misconfigurations, quantify their impact to companies and consumers around the world, and identify factors that may increase the likelihood a company will suffer such a breach.

(more available)
Added: July 6, 2020
image from Weaving a Safer Web: The State and Significance of TLS 1.2 Support

Weaving a Safer Web: The State and Significance of TLS 1.2 Support

A deep dive into the state of deploying the latest TLS version (v1.2) and the use of this signal for correlating with broader public-facing risk surfaces and characteristics of firms.

(more available)
Added: July 6, 2020
image from Reimagining Customer Privacy for the Digital Age

Reimagining Customer Privacy for the Digital Age

This report by Deloitte goes in-depth into the state of consumer privacy, breaking it down into 8 categories: Association/Group Privacy, Location and Space, Personal Communication, Biological data, Images, Thoughts and Feelings, Behavior and Actions, and Traditional Identifiers. It explains each category thoroughly.

(more available)
Added: June 29, 2020
image from Cybersecurity Insights Volume 9: Security at the Speed of 5G

Cybersecurity Insights Volume 9: Security at the Speed of 5G

A survey-based report covering 704 cybersecurity professionals from organization with more than 500 employees. This edition has a special focus on the impact of 5G technologies for security professionals.

(more available)
Added: June 12, 2020
image from Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

A combination of data from RiskIQ’s internet telemetry network and thought analysis, this report covers changes related to the COVID-19 pandemic, organization’s public attack surface, mobile threats, and the importance of JavaScript as an attack vector.

(more available)
Added: June 11, 2020
image from Cloud Threat Landscape Report 2020

Cloud Threat Landscape Report 2020

Using case data from IBM’s external incident response service involvement in cloud-related security incidents over 2019, this report covers threat actors, threat actions, common control weaknesses, and makes recommendations for increase cloud security postures. Additional data contributed by Intezer and DarkOwl.

(more available)
Added: June 10, 2020
image from 2019 Application Protection Report, 2nd Edition: The Virtue of Visibility

2019 Application Protection Report, 2nd Edition: The Virtue of Visibility

The second annual application protection report (APR) from F5 Labs combines data from F5’s global customer base with network telemetry from Baffin Bay to catalog and analyze the major threats facing application security practitioners. Includes recommendations for appsec professionals.

(more available)
Added: June 3, 2020
image from Radware DDoS Protection Market Impact Report

Radware DDoS Protection Market Impact Report

This report goes in depth on Radware’s performance in mitigating DDoS attacks.

Added: May 21, 2020
image from Smoke and Mirrors: Do AI and Machine Learning Make a Difference in Cyber security?

Smoke and Mirrors: Do AI and Machine Learning Make a Difference in Cyber security?

It’s clear from these findings that there is still a lot of confusion around artificial intelligence and machine learning, especially in terms of these technologies’ in business cybersecurity. In spite of a small amount of regional variance, the overall results of this survey indicated a relatively even amount of skepticism across all geographies, with respect to how much benefit AI/ML brings.

(more available)
Added: May 18, 2020
image from 2020 SANS Cyber Threat Intelligence (CTI) Survey

2020 SANS Cyber Threat Intelligence (CTI) Survey

A lot of progress has been made in the past few years around requirements. Next steps in this area include identifying when and why to update intelligence requirements—even ad hoc adjustments can be planned for by identifying the circumstances under which they would need to be changed. It is also clear that there are numerous positive trends in the community, such as more organizations producing intelligence instead of just consuming it. But there are also many challenges, such as getting the appropriate staffing and training to conduct cyber threat intelligence. Tools and data sources are always going to be vital to the process, but the world of intelligence analysis is inherently analyst driven and a focus is rightfully placed there.

(more available)
Added: May 11, 2020
image from Hook, Line, and Sinker- Why Phishing Attacks Work

Hook, Line, and Sinker- Why Phishing Attacks Work

In this report, we’ll dig deeper into the survey results and present our own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from our customers and partners, and tips on how to stay safe from phishing threats.

(more available)
Added: May 11, 2020
image from Impact Report 2020

Impact Report 2020

As software proliferates and DevOps takes hold, we conducted this study to understand the impact of utilizing Pentest as a Service (PtaaS) vs. traditional pentesting services. Within the backdrop of modern software development practices and rising appsec priorities, our study found that DevOps is a driving force for pushing pentest into the cloud and deploying Pentest as a Service. Furthermore, DevOps demands that appsec measures are delivered in a fashion that favors communication, transparency, and collaboration- PtaaS is exactly the evolution that addresses those aspects.

(more available)
Added: May 11, 2020
image from 2020 Global Identity and Fraud Report

2020 Global Identity and Fraud Report

Experian’s 2020 Global Identity & Fraud Report explores inconsistencies between businesses’ views of their ability to meet their customers’ needs, and customer experiences with those businesses. It also underscores the opportunity for companies like yours to differentiate from the competition through the ways you engage with customers, with emphasis on how you identify and recognise them each time they interact with your business. Experian appreciates that many companies find it challenging to evolve traditional business models in order to meet the expectations of ‘always-on’ customers. But we also believe that customers’ identity verification and ongoing recognition (re-recognition) can be driving forces for greatly improved and more profitable customer relationships.

(more available)
Added: May 8, 2020
image from Digital Pulse Coronavirus Flash Survey March 2020

Digital Pulse Coronavirus Flash Survey March 2020

This document is the product of a flash survey, an unscheduled, event-driven survey with a fast turnaround to cover a rapidly evolving situation relevant to tech markets. This survey was designed to measure the impact of the COVID-19 coronavirus outbreak on businesses. It was conducted between March 10 and March 19, 2020, and represents approximately 820 completes from pre-qualified IT decision-makers.

(more available)
Added: April 4, 2020
image from The State of IT Operations and Cybersecurity Operations

The State of IT Operations and Cybersecurity Operations

The 2019 Dark Reading State of IT Operations and Security Operations survey uncovered some important developments in the way enterprises are managing security in the data center – and in the boardroom. Here are some key takeaways: • 57% of respondents said IT and security staff communicate well, up from 47% last year. • 20% of organizations involve the security team at the start of every major IT project. • 69% of respondents say that the security team holds primary responsibility for compliance and privacy; this figure rose significantly – more than 12% – from our 2018 survey. • 90% of organizations expect the security team to take charge of developing and setting security policy. • 80% said the IT operations team is primarily responsible for patch management. • 20% of organizations have a distinct security department that operates separately from the IT team. • 18% of organizations have a fully-staffed security function. • 37% said the security operations team is most likely to be the first to detect and alert others about security incidents in the organization.

(more available)
Added: February 18, 2020
image from Global DDoS Threat Landscape Q4 2017

Global DDoS Threat Landscape Q4 2017

Imperva outlines trends in the DDoS threat landscape in 2017, including that the number of attacks has doubled, that crypto-currency continues to be targeted, and that persistent attacks are growing more common.

(more available)
Added: February 17, 2020
image from Cloud Adoption and Risk Report: Business Growth Edition

Cloud Adoption and Risk Report: Business Growth Edition

A survey-based review of how and why organizations are adopting cloud technologies, specifically from a business growth perspective. Makes some specific recommendations and has discussion on CASB solutions.

(more available)
Added: February 12, 2020
image from 2020 Insider Threat Report

2020 Insider Threat Report

The 2020 Insider Threat Report reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders, and how organizations are preparing to better protect their critical data and IT infrastructure.

(more available)
Added: February 9, 2020
image from 2019 Healthcare Report

2019 Healthcare Report

This report goes in-depth into trends in healthcare data security, surveying 26,000 companies and analyzing terabytes of information.

Added: February 7, 2020
image from Cyber Insurance- The Market's View

Cyber Insurance- The Market's View

This global survey was carried out during the third quarter of 2019. 271 brokers and 96 underwriters – all involved in cyber insurance - shared with us their observations and views of the cyber insurance marketplace

(more available)
Added: February 6, 2020
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)