Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Benchmark

Below you will find reports with the tag of “Benchmark”

image from DevSecOps Community Survey 2017

DevSecOps Community Survey 2017

This report offers insight into the DevSecOps Community.

Added: January 15, 2019
image from DevSecOps Community Survey 2018

DevSecOps Community Survey 2018

This survey, representing the voice of 2,076 IT professionals, demonstrates that DevSecOps practices continue to mature rapidly and that, once automated, security is difficult to ignore.

(more available)
Added: January 15, 2019
image from The Pulse Report 2018

The Pulse Report 2018

This report provides an international study of senior management attitudes to leadership development and executive education. It also provides insight into cybersecurity related issues.

(more available)
Added: November 28, 2018
image from Corporate Learning Pulse

Corporate Learning Pulse

This report offers a unique insight into the C-Suite. It pays particular attention to their views on Cybersecurity.

Added: November 28, 2018
image from The 2018 Identity Report

The 2018 Identity Report

This paper provides information about a comprehensive identity governance strategy. It offers a unique perspective on how an enterprise can gauge their identity strategy, and reduce risk in the organization.

(more available)
Added: November 27, 2018
image from Closing The Gap On Breach Readiness

Closing The Gap On Breach Readiness

This e-book contains insights on breach readiness, response and resiliency based on in-depth interviews conducted with the Security for Business Innovation Council (SBIC). The SBIC is comprised of forward-thinking security executives from Global 1000 enterprises committed to advancing the state of information security worldwide by sharing insights from their real-world experience.

(more available)
Added: November 27, 2018
image from Why Device Age Matters

Why Device Age Matters

Cybercriminals will use any and all devices available to them in order to lie, cheat and steal from you. Until they’re blocked. Then they switch to different devices, counting on your fraud prevention efforts to forget about their old devices. When that happens, they start using their old devices again. They would love for you to believe that device history isn’t important. That’s why your fraud prevention tools shouldn’t forget older devices either. It’s essential to know when a device, especially one that’s new to your business, has a history of fraud. Even if that fraud happened years ago.

(more available)
Added: November 24, 2018
image from Top Of Mind For Top U.S. Health Systems 2018

Top Of Mind For Top U.S. Health Systems 2018

To provide insight into some of the top trends in health IT, the Center for Connected Medicine partnered with The Health Management Academy to survey C-suite health system executives on health IT priorities for 2018. The quantitative and qualitative surveys focused on five areas: Cybersecurity, Consumer-Facing Technology, Virtual Care, Artificial Intelligence, and Predictive Analytics.

(more available)
Added: November 23, 2018
image from 2018 SANS Security Awareness Report

2018 SANS Security Awareness Report

This report analyzes the data submitted by 1,718 security awareness professionals from around the world to identify and benchmark how organizations are managing their human cyber security risk. The analysis includes how factors such as security awareness program maturity, funding, and staffing combine to make successful programs.

(more available)
Added: November 6, 2018
image from State Of Software Security Volume 9

State Of Software Security Volume 9

“For a long time now, SOSS has provided a reliable yardstick for the most common vulnerabilities found in software, as well as how organizations are measuring up to security industry benchmarks throughout the software development lifecycle (SDLC). One thing we’ve always wanted to understand better, though, is how quickly these organizations are actually fixing flaws once they’ve been identified in application security scans. This year, we turned our data analysis up a notch by working with the data scientists at Cyentia Institute, so that we could gain better visibility into the factors that go into fixing flaws. Readers will find valuable insight on how factors like flaw severity, business criticality of applications, and exploitability of the flaws change the rate at which certain vulnerabilities are fixed.”

(more available)
Added: November 4, 2018
image from Cyber Update: 2015 Cyber Insurance Profits and Performance

Cyber Update: 2015 Cyber Insurance Profits and Performance

A total of 117 US insurers were found to have underwritten cyber insurance in 2015. This paper has analyzed these filings and has outlined them to provide insights for insurers that either currently offer or seek to offer cyber insurance to help them benchmark and drive decisions on underwriting and reinsurance purchase.

(more available)
Added: October 26, 2018
image from 2018 Cost Of A Data Breach Study: Global Overview

2018 Cost Of A Data Breach Study: Global Overview

IBM Security and Ponemon Institute are pleased to release the 2018 Cost of Data Breach Study: Global Overview1. They conducted interviews with more than 2,200 IT, data protection, and compliance professionals from 477 companies that have experienced a data breach over the past 12 months. According to the findings, data breaches continue to be costlier and result in more consumer records being lost or stolen, year after year.

(more available)
Added: October 24, 2018
image from Customer Communications Report

Customer Communications Report

This report is based on the survey results conducted by TeleSign. It seeks to understand how businesses are using cloud communications to fuel growth.

(more available)
Added: October 24, 2018
image from How Personal Device Data Can Compromise Company Data

How Personal Device Data Can Compromise Company Data

Beginning with the Strava cyber incident, this paper seeks to provide insight into how personal device data can cause a crisis with company data.

(more available)
Added: October 24, 2018
image from Risk and Regulatory Outlook 2015

Risk and Regulatory Outlook 2015

In this edition of Risk and Regulatory Outlook a Deloitte subject matter expert outlines the situation, specifies existing or prescient change, and suggests practical steps in each of the nine key areas of regulatory change we focus on.

(more available)
Added: October 24, 2018
image from 2016 Cost of Data Breach Study: Global Analysis

2016 Cost of Data Breach Study: Global Analysis

This global study examines 383 companies in 12 countries. It finds that $4 million is the average total cost of a data breach. It sees a 29% increase in total costs of data breaches since 2013. It finds that $158 is the average cost per lost or stolen record. Finally, there has been a 15% increase in per capita cost since 2013.

(more available)
Added: October 23, 2018
image from Consumer Account Security Report 2016

Consumer Account Security Report 2016

The report describes consumers’ account security practices, their exposure to security incidents and their expectations for companies to protect their mobile and online accounts. Data are drawn from an online survey of 1,300 adults conducted in September 2016.

(more available)
Added: October 23, 2018
image from Digital Malware: Impact On The E-Commerce Market

Digital Malware: Impact On The E-Commerce Market

This report will outline benchmarks for the state of the Digital Malware problem, including the current infection rate of consumer machines, the rate of infected online sessions, causes for fluctuation, and guidance on how online businesses can protect their customer journey and win back lost revenue.

(more available)
Added: October 23, 2018
image from 2015 Cost of Data Breach Study: United States

2015 Cost of Data Breach Study: United States

This year’s study examines the costs incurred by 62 U.S. companies in 16 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims as required by various laws. It is important to note the costs presented in this research are not hypothetical, but are from actual data loss incidents. They are based upon cost estimates provided by individuals, interviewed over a ten-month period in the companies that are represented in this research

(more available)
Added: October 22, 2018
image from 2018 Connectivity Benchmark Report

2018 Connectivity Benchmark Report

This report, which benchmarks how IT decision makers are handling digital transformation, IT operations, and change management, takes an in-depth look at where organizations are on their digital journey and uncovers the challenges they face when integrating new and existing technologies.

(more available)
Added: October 22, 2018
image from Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey

Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey

This is a brief playbook that gives a plan for how to get started with cloud security.

Added: October 22, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)