Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Benchmark

Below you will find reports with the tag of “Benchmark”

image from DNS Network Traffic Volumes During the 2020 Pandemic

DNS Network Traffic Volumes During the 2020 Pandemic

Review of DNS traffic trends during the 2020 COVID-19 pandemic as an indicator of enterprise activity and possible DDOS events.

(more available)
Added: May 28, 2020
image from Digital Transformation to Strategic Initiatives

Digital Transformation to Strategic Initiatives

Advice for CIOs building strategic initiatives around digital transformation.

Added: May 18, 2020
image from 2020 Cost of Insider Threats: Global Report

2020 Cost of Insider Threats: Global Report

Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats: Global study. Sponsored by ObserveIT and IBM, this is the third benchmark study conducted to understand the direct and indirect costs that result from insider threats.

(more available)
Added: March 29, 2020
image from 2020 Connectivity Benchmark Report

2020 Connectivity Benchmark Report

This report covers connectivity trends for 2020. It goes over four main key findings, including that data silos are slowing digital transformation, that organizations are reaping the benefits of APIs, that IT teams with an API strategy drive greater business outcomes, and that top-down API strategies are the most effective.

(more available)
Added: February 17, 2020
image from State of DevOps 2019

State of DevOps 2019

This report investigates the ways in which organizations can support engineering productivity through initiatives such as supporting information search, more usable deployment toolchains, and reducing technical debt through flexible architecture, code maintainability, and viewable systems.

(more available)
Added: November 27, 2019
image from 2019 Endpoint Security Trends Report

2019 Endpoint Security Trends Report

This report outlines the findings from extensive primary research analyzing more than six million enterprise devices over a one year period. Our analysis led to a stunning discovery: much of endpoint security spend is voided because tools and agents fail, reliably and predictably. The clear conclusion is that increasing security spending does not increase safety. In fact, every additional security tool only increases the probability of failure and decay. The data in this report provides evidence that merely investing in more endpoint security tools is ineffective, and a new approach is needed. To secure the endpoint, the security tools already in place must be made resilient.

(more available)
Added: July 10, 2019
image from The State Of Mobile 2019

The State Of Mobile 2019

This very thorough report offers insight into the future of the Mobile trends of 2019.

Added: April 19, 2019
image from The Cost Of Cybercrime

The Cost Of Cybercrime

The ninth annual cost of cybercrime study helps to quantify the economic cost of cyberattacks by analyzing trends in malicious activities over time.

(more available)
Added: April 4, 2019
image from DevSecOps Community Survey 2019

DevSecOps Community Survey 2019

“Our 6th annual DevSecOps community survey, represents the voice of 5,558 IT professionals and demonstrates that DevOps practices are maturing rapidly, security is being automated earlier in the development lifecycle, and management of software supply chains is a critical differentiator. "

(more available)
Added: March 6, 2019
image from 2019 Connectivity Benchmark Report

2019 Connectivity Benchmark Report

MuleSoft commissioned independent market research company Vanson Bourne to survey 650 IT leaders from global enterprises to discover: › What is the state of today’s digital transformation initiatives? › How is the role of IT evolving in the customer-centric era? › What are the top challenges IT organizations face? › Which strategies are enterprises adopting to get ahead of the market?

(more available)
Added: March 1, 2019
image from Are The New European Cybersecurity Regulations Working?

Are The New European Cybersecurity Regulations Working?

This infographic offers insights relating to the European Cybersecurity regulations.

Added: February 17, 2019
image from The State Of Manual Reviews: 2018 Report

The State Of Manual Reviews: 2018 Report

The State of Manual Reviews: 2018 Report, brought to you by Kount and Paladin Group, provides survey results about manual review trends and best practices in the card-not-present (CNP) payments environment. It includes key performance indicators (KPIs) and demographic details related to participating merchants. In addition, participants in the survey shared insights about the tools, services, and solutions they employ for their manual review process.

(more available)
Added: February 16, 2019
image from The State of CNP False Positives: 2018 Report

The State of CNP False Positives: 2018 Report

Kount and The Fraud Practice designed the State of CNP False Positives survey because false positives are one of the least, if not the least, understood aspects of risk management. While merchants tend to focus directly on chargebacks and fraud losses, false positives are another major source of lost revenue but are often underestimated if not ignored altogether.

(more available)
Added: February 16, 2019
image from Fraud Prevention Industry Benchmarks: 2018 Report

Fraud Prevention Industry Benchmarks: 2018 Report

The Fraud Prevention Industry Benchmarks Survey was focused specifically on merchants doing business in the Card or Customer Not Present (CNP) channel. This study was designed to gain insights and information for comparison of key performance indicators (KPIs) such as manual review rates, chargeback rates, false positive rates and other metrics across different types of merchants, while the analysis report is intended to serve as an industry resource and point-of-reference for organizations looking to benchmark and compare the performance of their fraud prevention strategy against others in their vertical.

(more available)
Added: February 16, 2019
image from Global Fraud Attack Index: October 2016

Global Fraud Attack Index: October 2016

From the report, “Forter and PYMNTS.com have partnered to track, analyze and report on important fraud trends in the world of payments and online commerce. Every quarter, we monitor fraud attempts on U.S. merchant websites to give you the latest insights on what’s going on. (Note: For each of the Indexes in 2016, we’re using 2015’s fraud rates as a benchmark.) Our take-home this quarter: Fraud rates are climbing. They climbed last quarter and are still climbing this quarter. In fact, overall fraud rates have increased by 14 percent from last quarter to this quarter. To find out how fraudsters are doing it and what methods they favor, keep reading.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Misconceptions About Building a Machine Learning Platform For Risk

Misconceptions About Building a Machine Learning Platform For Risk

In this paper the CTO of Feedzai writes about several of the misconceptions related to organizations leveraging in-house resources to create their own machine learning system for risk. He discusses the lack of success surrounding those decisions.

(more available)
Added: February 13, 2019
image from Addressing Analyst Fatigue In The SOC

Addressing Analyst Fatigue In The SOC

This whitepaper is intended to help firms identify the symptoms of SOC Analyst fatigue, recognize the underlying causes and evaluate recommendations for addressing the problem.

(more available)
Added: February 12, 2019
image from Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

In this report we analyze real-world end-user vulnerability assessment (VA) behavior using a machine learning (ML) algorithm to identify four distinct strategies, or “styles.” These are based on five VA key performance indicators (KPIs) which correlate to VA maturity characteristics. This study specifically focuses on key performance indicators associated with the Discover and Assess stages of the five-phase Cyber Exposure Lifecycle. During the first phase – Discover – assets are identified and mapped for visibility across any computing environment. The second phase – Assess – involves understanding the state of all assets, including vulnerabilities, misconfigurations, and other health indicators. While these are only two phases of a longer process, together they decisively determine the scope and pace of subsequent phases, such as prioritization and remediation. The actual behavior of each individual enterprise in the data set, in reality, exhibits a mixture of all VA Styles. For the purposes of this work, enterprises are assigned to the specific style group with which they most closely align. We provide the global distribution of VA Styles, as well as a distribution across major industry verticals.

(more available)
Added: February 12, 2019
image from The State Of Cybersecurity At Financial Institutions

The State Of Cybersecurity At Financial Institutions

The survey upon which this report is based was fielded by the Financial Services Information Sharing and Analysis Center, in conjunction with Deloitte’s Cyber Risk Services practice. Fifty-one companies participated in the pilot launch of the survey, with representation from entities both larch and small, as well as those in between. Respondents came from all financial sectors, albeit skewed more heavily toward the US banking community.

(more available)
Added: February 7, 2019
image from State of DevOps:Market Segmentation Report

State of DevOps:Market Segmentation Report

From the report, “For the past six years, Puppet has produced the annual State of DevOps Report1 and collected more than 27,000 responses from technical professionals around the world, making it the longest-running and most comprehensive study on the topic of DevOps today. One of the most common requests we’ve gotten over the years is for segmentation of the data by region, industry and company size. In this special report, we’ve segmented the 2017 State of DevOps survey data to dive deeper into trends and patterns we’re seeing in each of these segments.”

(more available)
Added: January 24, 2019
image from 2018 DevOps Salary Report

2018 DevOps Salary Report

From the report, “It’s that time of year again. We’ve conducted and compiled the results of our State of DevOps survey to illustrate how your job, salary, and industry compare to other professionals in your field. This is our fifth annual DevOps salary report, and each year we learn more about how DevOps practices impact organizations globally and how the people who produce those results and how they’re compensated. This report examines a myriad of factors impacting salary levels, which include region, role, demographics, industry, and size of organization. We had over 3,000 technology professionals from around the world respond to our survey. As before, we broke down the data by geographic region — but this time with an international focus on the UK, Asia, and Europe.”

(more available)
Added: January 24, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)