Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Application Security

Below you will find reports with the tag of “Application Security”

image from The State of Secrets Sprawl 2022

The State of Secrets Sprawl 2022

In this report, data reveals that on average, in 2021, a typical company with 400 developers would discover 1,050 unique secrets leaked upon scanning its repositories and commits. With each secret detected in 13 different places on average, the amount of work required for remediation far exceeds current AppSec capabilities: with a security-to-developers ratio of 1:100.

(more available)
Added: October 5, 2022
image from State of Cloud Native Application Security

State of Cloud Native Application Security

As companies embrace cloud native technologies as part of their digital transformation, security is seen as a key factor to building successful platforms. While only 36% of respondents stated that security was one of the main reasons for moving their production applications into containers, 99% of respondents recognize that security as an important element in their cloud native strategy.

(more available)
Added: September 28, 2022
image from The GitLab 2022 Global DevSecOps Survey

The GitLab 2022 Global DevSecOps Survey

In May 2022, over 5,000 DevOps professionals shared details about their teams and practices. Despite a challenging business environment, strong momentum continued in automation, release cadences, and cutting-edge technology adoption. Secure software development is now an imperative for DevOps teams around the world. It’s the number one reason for - and benefits of - DevOps platform usage.

(more available)
Added: September 20, 2022
image from GritLab DevSecOps Global Survey 2021

GritLab DevSecOps Global Survey 2021

For the fourth year in a row, we asked DevOps teams to tell the truth about their practices and processes, their challenges and their careers. With a global pandemic swirling, we were surprised when nearly 4,300 people took time to do just that this past February. In 2021, teams are poised to step out of the DevOps “culture” battle and into the real work of technology implementation and (surprisingly) upbeat results.

(more available)
Added: September 15, 2022
image from The State of Cloud Security Report 2022

The State of Cloud Security Report 2022

For this report, Snyk surveyed more than 400 cloud engineering and security professionals to better understand the cloud risks and challenges they face, and how they’re successfully improving their cloud security efforts.

(more available)
Added: September 15, 2022
image from State of API Security Q3 2022

State of API Security Q3 2022

The State of API Security Report from Salt Labs is the industry’s only report on API security risks, challenges, and strategies. The Q3 2022 report incorporates survey results and empirical data from the Salt SaaS platform hosting our customers’ API metadata. The most eye-opening findings from the report comes from our customers. Over the past year, Salt customers experienced a 117% increase in API attack traffic while their overall API traffic grew 168%.

(more available)
Added: September 15, 2022
image from Leveraging Observability Data for DevSecOps

Leveraging Observability Data for DevSecOps

As organizations adopt modern software development processes leveraging cloud platforms, they are looking to incorporate security processes and controls into their software development lifestyle (SDLC) processes.

(more available)
Added: August 17, 2022
image from The state of industrial security in 2022

The state of industrial security in 2022

This report takes an in-depth look at lloT/OT security projects, implementation challenges, security incidents, technology investments, and a variety of issues related to cybersecurity risks.

(more available)
Added: July 12, 2022
image from SIEM Report 2022

SIEM Report 2022

The 2022 SIEM Report is based on a survey of 348 cybersecurity professionals and represents one of the industry’s most comprehensive annual studies on SIEM, exploring the latest trends, key challenges, and solution preferences in this market.

(more available)
Added: July 5, 2022
image from Sysdig 2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report

In this report, you will find details about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries.

(more available)
Added: June 28, 2022
image from Sysdig 2021 Container Security and Usage Report

Sysdig 2021 Container Security and Usage Report

In this report, you will find further detail about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries.

(more available)
Added: June 28, 2022
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

The CDR is the most geographically comprehensive, vendor-agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches, the CDR surveys the perceptions of IT security professionals, gaining insights into how they see the world.

(more available)
Added: June 23, 2022
image from The State of Pentesting 2019

The State of Pentesting 2019

The information included in this report is summary data from the pentesting performed in 2018. Additionally, we provide survey data from respondents in security, management, operations, DevOps, product, and developer roles.

(more available)
Added: May 16, 2022
image from The State of Pentesting: 2020

The State of Pentesting: 2020

The State of Pentesting: 2020 report assesses which web application security vulnerabilities can be found reliably using machines and which require human expertise to manually identify. The scope of his exploration is black-box penetration testing (“humans”) against dynamic scanning and out-of-band testing (“machines”) for web applications.

(more available)
Added: May 16, 2022
image from The State of Pentesting 2022

The State of Pentesting 2022

The State of Pentesting 2022 Report focuses on issues and stats that are relevant to both security and development teams: to separate these two inextricably linked groups would only yield a partial picture of the security landscape.

(more available)
Added: May 4, 2022
image from Threat Intelligence Executive Report 2021 Vol. 1

Threat Intelligence Executive Report 2021 Vol. 1

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from State of Software Security v12

State of Software Security v12

This report looks at the entire history of active applications, not just the activity associated with the application over one year. By doing so, we can view the full life cycle of applications, which results in more accurate metrics and observations. Aside from looking at the past, this report also imagines the future by considering practices that might help improve application security.

(more available)
Added: February 10, 2022
image from The State of Cloud Native Security Report 2022

The State of Cloud Native Security Report 2022

Palo Alto Networks surveyed 3,000 cloud security and DevOps professionals from around the world to gain insight into organizations’ cloud adoption strategies, budgets, experiences, and future plans.

(more available)
Added: January 20, 2022
image from Cyber Security in Focus 2022

Cyber Security in Focus 2022

An annual state of the market report, which explores the views of a snapshot cohort of 55 security leaders on key themes, including; the skills shortage, barriers to strategy execution, the business perception of cyber security, and more.

(more available)
Added: January 20, 2022
image from The State of Pentesting 2021

The State of Pentesting 2021

This annual report covers data from 1,602 penetration tests conducted in 2020 as well as survey information from 601 firms in the pursuit of understanding secure development, vulnerability remediation, and opportunities for process improvements.

(more available)
Added: August 4, 2021
image from The State of the State of Application Exploits in Security Incidents

The State of the State of Application Exploits in Security Incidents

A meta-analysis of industry reports on the variety and forms of application exploits used in security incidents.

Added: July 22, 2021
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)