Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Benchmark

Below you will find reports with the tag of “Benchmark”

image from Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

This paper seeks to simplify Cloud security and offers some solutions to the issues that an enterprise might deal with.

(more available)
Added: October 16, 2018
image from State of Software Security Volume 8

State of Software Security Volume 8

In this, the eighth volume of this report, they present metrics that are based on real application risk postures, drawn from code-level analysis of nearly 250 billion lines of code across 400,000 assessmnets performed over a period of 12 months between April 1, 2016 and March 31, 2017.

(more available)
Added: October 16, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

The fifth annual State of DevOps Report confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns.

(more available)
Added: October 15, 2018
image from BitSight Insights: Global View

BitSight Insights: Global View

This report will help you learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations. It is the result of studying the performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.

(more available)
Added: October 15, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. They then outline best practices for cost-effectively mitigating risk and euring quality in life-critical deployment scenarios.

(more available)
Added: October 14, 2018
image from Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

This blog post discusses the point that organizations need to assess cybersecurity as a business enabler, rather than a hindrance.

(more available)
Added: October 14, 2018
image from 2015 Cost of Cyber Crime Study: United States

2015 Cost of Cyber Crime Study: United States

Our goal is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the consequences of an attack.

(more available)
Added: October 13, 2018
image from Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience.

(more available)
Added: October 13, 2018
image from Cyber Security Economic Issues

Cyber Security Economic Issues

The emerging field of cybersecurity economics could benefit from better data, better under- standing, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity invest- ment decisions. In particular, it suggests that companies, the government, and other organizations can help improve our under- standing of cybersecurity economics by moni- toring cybersecurity incidents and responses, soliciting and using standard terminology and measures, and sharing data whenever possible.

(more available)
Added: October 13, 2018
image from Microlearning: Small Bites, Big Cybersecurity Impact

Microlearning: Small Bites, Big Cybersecurity Impact

This whitepaper covers the six things every organization must have to “move the security awareness training” needle.

Added: October 13, 2018
image from 2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

This report will help you benchmark your third-party risk management program and its performance against trends in the market and best practices.

(more available)
Added: October 12, 2018
image from GDPR Friend Or Foe

GDPR Friend Or Foe

This white paper the explore the GDPR. The consequences of non-compliance, and how an organization can use the GDPR to re-examine and upgrade their security posture.

(more available)
Added: October 12, 2018
image from State Of The Global Technology Economy

State Of The Global Technology Economy

In this report, they examine research on the global growth of technology spend and spending patterns behind the highest performing companies. They also share best practices used by top performers to maximize the business value of their spend.

(more available)
Added: October 12, 2018
image from Validating The New World Of 400 Gigabit Ethernet: The Return Of Industry Benchmarking

Validating The New World Of 400 Gigabit Ethernet: The Return Of Industry Benchmarking

Read this white paper to understand why this is a critical time to renew efforts to compare and benchmark the performance of these new network products and devices.

(more available)
Added: October 12, 2018
image from Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

Where Do We Go From Here? 2017 Risk Management Maturity Benchmark Survey

In this report they seek to answer four important questions. How mature is the profession today? Where are we weakest/strongest? Which improvements in maturity are likely to matter most? How do we rate against others in our industry?

(more available)
Added: October 12, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)