Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Application Security

Below you will find reports with the tag of “Application Security”

image from The CISO Current Report

The CISO Current Report

This document institutes the third edition of the CISO Current report and contains data gathered from direct interviews surveying almost 40 cybersecurity executives at leading enterprises.

(more available)
Added: May 8, 2020
image from 2020 Cyberthreat Defense Report

2020 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great job of collecting statistics on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad actors. Our mission is the provide deep insight into the minds of IT security professionals.

(more available)
Added: May 8, 2020
image from Cloud Adoption and Risk Report: Business Growth Edition

Cloud Adoption and Risk Report: Business Growth Edition

A survey-based review of how and why organizations are adopting cloud technologies, specifically from a business growth perspective. Makes some specific recommendations and has discussion on CASB solutions.

(more available)
Added: February 12, 2020
image from Exploring Coordinated Disclosure: Shedding Light on Perceptions and Experience in How Software Vulnerabilities are Reported

Exploring Coordinated Disclosure: Shedding Light on Perceptions and Experience in How Software Vulnerabilities are Reported

Veracode commissioned this survey from 451 Research to understand how widely accepted andpracticed coordinated disclosure – whereby a security researcher identifies a flaw and notifiesthe company, then the two work together to fix and publicly disclose the flaw – really is andwhere the pain points reside. In addition, we wanted to explore the means organizations haveestablished to receive vulnerability reports, and the attitudes toward a coordinated disclosurepolicy on both sides of the organization and among external security researchers. We also soughta deeper understanding of the motivations of security researchers, actions when a vulnerabilityis identified, timing for disclosure, desired outcomes, how organizations structure disclosurepolicies, and the effectiveness of bug bounties.

(more available)
Added: February 12, 2020
image from The state of JavaScript frameworks security report 2019

The state of JavaScript frameworks security report 2019

This report covers: the security practices for each of the two different core projects, both Angular and React, the state of security of each of the two different module ecosystems, based on an in-depth look at the vulnerabilities contained in each of the ecosystems, the security practices for other common JavaScript frontend framework alternatives such as Vue.js, Bootstrap and jQuery, and the significant security differences between the different alternatives, and particularly between Angular and React

(more available)
Added: February 12, 2020
image from The State of Application Development

The State of Application Development

This report from Outsystems is based off of a survey of over 3,300 companies. It had 5 key things they looked into: How organizations’ app dev practices adapt to meet digital transformation and agility objectives, challenges in meeting application development goals, strategies IT teams use to speed up application delivery, and if these strategies are working to overcome resource constraints and reduce backlogs.

(more available)
Added: February 12, 2020
image from The State of Open Source Security Report

The State of Open Source Security Report

This report outlines the state of open source security, including open source adoption, known vulnerabilities, and vulnerability identification.

Added: February 7, 2020
image from 2019 Healthcare Report

2019 Healthcare Report

This report goes in-depth into trends in healthcare data security, surveying 26,000 companies and analyzing terabytes of information.

Added: February 7, 2020
image from 2020 RSAS Trend Report

2020 RSAS Trend Report

Each year, industry leaders from around the world submit an application to be a speaker at RSA Conference. This year, we received 2,400 responses to our 2020 Call for Speakers. By sifting through all the entries, we were able to identify 10 trends that weaved their way through many of the submissions. Examining these trends provides a glimpse of what will be on the minds of cybersecurity professionals in 2020,

(more available)
Added: February 7, 2020
image from AppSec Trend Report

AppSec Trend Report

A report by DZone showing trends in the changing AppSec industry.

Added: December 2, 2019
image from State of Software Security Volume 10

State of Software Security Volume 10

This report goes in depth on the state of software security, going into overall security, application security testing, how flaws are and are not equal, and security debt.

(more available)
Added: November 25, 2019
image from Strategies for Building and Growing Strong Cybersecurity Teams

Strategies for Building and Growing Strong Cybersecurity Teams

This report explores the results of the 2019 (ISC)² Cybersecurity Workforce Study, providing details on the cybersecurity workforce and gap estimates, taking a closer look at cybersecurity professionals and their teams, reviewing key steps on the cybersecurity career path, and discussing insights into immediate and longer-term methods for building qualified and resilient cybersecurity teams now and in the future.

(more available)
Added: November 25, 2019
image from The Economics of Penetration Testing for Web Application Security

The Economics of Penetration Testing for Web Application Security

This white paper describes the critical role of pen testing for web applications. It explores the economics of “classic” pen testing and considers a variety of unseen costs and points of diminishing value. The paper concludes by describing a next-generation hybrid applicationsecurity-testing-as-a-service and how it can help bring the flexibility in applying both automated app testing tools (DAST) and the human expertise of ethical hackers (pen testing) to this challenge.

(more available)
Added: September 18, 2019
image from Priority One: The State of Crowdsourced Security In 2019

Priority One: The State of Crowdsourced Security In 2019

From the report, “It is clear that there is no shortage of vulnerabilities to find. In the last year, Bugcrowd saw a 92% increase in total vulnerabilities reported over the previous year. The average payout per vulnerability increased this year by a whopping 83%, with average payouts for critical vulnerabilities reaching $2,669.92 — a 27% increase over last year.”

(more available)
Added: September 18, 2019
image from The Changing Face of Data Security- 2019 Thales Data Threat Report

The Changing Face of Data Security- 2019 Thales Data Threat Report

This report focuses specifically on data threats in the healthcare industry.

Added: September 18, 2019
image from The DevSecOps Approach

The DevSecOps Approach

This report is essential reading for executives, security practitioners and development teams who want to better understand the present state of software security risk, and who seek to benchmark and improve their own organization’s performance.

(more available)
Added: September 18, 2019
image from 2019 Vulnerability Statistics Report

2019 Vulnerability Statistics Report

From the report, “For our 4th Year running, welcome to the edgescan Vulnerability Stats Report. This report aims to demonstrate the state of full stack security based on edgescan data for 2018. The edgescan report has become a reliable source for truly representing the global state of cyber security. This year we took a deeper look at vulnerability metrics from a known vulnerability (CVE) and visibility standpoint. We still see high rates of known/patchable vulnerabilities which have working exploits in the wild, which possibly demonstrates it is hard to patch production systems effectively on a consistent basis.”

(more available)
Added: May 3, 2019
image from Inside The Mind Of A Hacker

Inside The Mind Of A Hacker

This report offers an inside look at hackers. It provides a glimpse into the BugCrowd community, identifies 5 distinct types of bug hunters and their motivations, Explores program variables that can motivate and encourage different types of bug hunters and the community as a whole.

(more available)
Added: April 23, 2019
image from Security Leadership Study - Trends in Application Security

Security Leadership Study - Trends in Application Security

The evolving threat landscape and perennial cybersecurity challenges are giving rise to community-based programs such as crowdsourced cybersecurity, an important evolution that’s fast becoming a foundational element of any organization’s cybersecurity program. Crowdsourced cybersecurity includes services such as bug bounty programs, vulnerability disclosure, and next-generation penetration testing (NGPT). This report explores several key findings based on research conducted by ESG.

(more available)
Added: April 23, 2019
image from 2018 Application Security Report

2018 Application Security Report

This report is the result of a comprehensive survey of 437 cybersecurity professionals designed to reveal the latest application security trends, how organizations are protecting applications, and what tools and best practices IT cybersecurity teams are prioritizing to find, fix and prevent vulnerabilities in next-gen applications.

(more available)
Added: April 4, 2019
image from Watching You Through The Eyes Of Celia, A Telepresence Robot

Watching You Through The Eyes Of Celia, A Telepresence Robot

From the report, “Robotic telepresence is a next-generation technology that allows a person in one location to replicate himself in another. The remote person can see you, hear you, interact with you, and move all around your location. But wait a second! What if the person behind the robot is not who you think he is? What if the robot gets compromised, and now the attacker is watching you and your surroundings? In this whitepaper, all the findings learned while security testing a telepresence robot are presented, as well as the countermeasures implemented by the vendor.”

(more available)
Added: March 9, 2019
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)