Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Application security

Below you will find reports with the tag of “Application security”

image from Sysdig 2023 Cloud-Native Security and Usage Report

Sysdig 2023 Cloud-Native Security and Usage Report

This report is based on data gathered from billions of containers, thousands of cloud accounts, and hundreds of thousands of applications that our customers operated over the course of the last year. (more available)
Added: February 7, 2023
image from Enterprise Application Security

Enterprise Application Security

The goal of this Trend Report is to equip developers with the tools, best practices, and advice they need to help implement security at every stage of the SDLC. (more available)
Added: December 16, 2022
image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report has been produced by Cybersecurity Insiders to explore how organizations are responding to the evolving security threats in the cloud and the continues shortfall of qualified security staff. (more available)
Added: October 24, 2022
image from 2021 Identity and Access Management Report

2021 Identity and Access Management Report

The 2021 Identity and Access Management Report reveals the increasing importance of managing access as part of an organization’s overall risk management and security posture in the new normal of hybrid work locations. (more available)
Added: October 18, 2022
image from 2021 Application Security Report

2021 Application Security Report

This report reveals that the expanded use of applications for business-critical applications, combined with the increased pace of application changes that come with DevOps methodologies, has created security challenges for organizations. (more available)
Added: October 18, 2022
image from The State of Passwordless Security 2022

The State of Passwordless Security 2022

The 2022 State of Passwordless Security Report is based on a comprehensive survey of 411 technology professionals to explore the state of conventional and passwordless authentication, key drivers and barriers to adoption, and organizations' technology preferences. (more available)
Added: October 17, 2022
image from Threat Horizons September 2022

Threat Horizons September 2022

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on current and likely future threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from across Google’s intelligence and security teams. (more available)
Added: October 14, 2022
image from 2022 Application Security Report

2022 Application Security Report

This report reveals the latest application security trends, how organizations protect critical applications, and what tools and best practices cybersecurity professionals prioritize to find, fix and prevent vulnerabilities in next-gen applications. (more available)
Added: October 12, 2022
image from 2022 Application Security Report

2022 Application Security Report

This report is based on the results of a comprehensive online global survey of 386 cybersecurity professionals, conducted in July 2022, to gain deep insight into the latest trends, key challenges, and solutions for application security. (more available)
Added: October 12, 2022
image from The State of Secrets Sprawl 2022

The State of Secrets Sprawl 2022

In this report, data reveals that on average, in 2021, a typical company with 400 developers would discover 1,050 unique secrets leaked upon scanning its repositories and commits. (more available)
Added: October 5, 2022
image from State of Cloud Native Application Security

State of Cloud Native Application Security

As companies embrace cloud native technologies as part of their digital transformation, security is seen as a key factor to building successful platforms. (more available)
Added: September 28, 2022
image from The GitLab 2022 Global DevSecOps Survey

The GitLab 2022 Global DevSecOps Survey

In May 2022, over 5,000 DevOps professionals shared details about their teams and practices. Despite a challenging business environment, strong momentum continued in automation, release cadences, and cutting-edge technology adoption. (more available)
Added: September 20, 2022
image from GritLab DevSecOps Global Survey 2021

GritLab DevSecOps Global Survey 2021

For the fourth year in a row, we asked DevOps teams to tell the truth about their practices and processes, their challenges and their careers. (more available)
Added: September 15, 2022
image from The State of Cloud Security Report 2022

The State of Cloud Security Report 2022

For this report, Snyk surveyed more than 400 cloud engineering and security professionals to better understand the cloud risks and challenges they face, and how they’re successfully improving their cloud security efforts. (more available)
Added: September 15, 2022
image from State of API Security Q3 2022

State of API Security Q3 2022

The State of API Security Report from Salt Labs is the industry’s only report on API security risks, challenges, and strategies. (more available)
Added: September 15, 2022
image from Leveraging Observability Data for DevSecOps

Leveraging Observability Data for DevSecOps

As organizations adopt modern software development processes leveraging cloud platforms, they are looking to incorporate security processes and controls into their software development lifestyle (SDLC) processes. (more available)
Added: August 17, 2022
image from The state of industrial security in 2022

The state of industrial security in 2022

This report takes an in-depth look at lloT/OT security projects, implementation challenges, security incidents, technology investments, and a variety of issues related to cybersecurity risks. (more available)
Added: July 12, 2022
image from SIEM Report 2022

SIEM Report 2022

The 2022 SIEM Report is based on a survey of 348 cybersecurity professionals and represents one of the industry’s most comprehensive annual studies on SIEM, exploring the latest trends, key challenges, and solution preferences in this market. (more available)
Added: July 5, 2022
image from Sysdig 2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report

In this report, you will find details about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries. (more available)
Added: June 28, 2022
image from Sysdig 2021 Container Security and Usage Report

Sysdig 2021 Container Security and Usage Report

In this report, you will find further detail about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries. (more available)
Added: June 28, 2022
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

The CDR is the most geographically comprehensive, vendor-agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches, the CDR surveys the perceptions of IT security professionals, gaining insights into how they see the world. (more available)
Added: June 23, 2022
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 9
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 16:09 UTC (build 051771c)