Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Big Data

Below you will find reports with the tag of “Big Data”

image from 2020 Connectivity Benchmark Report

2020 Connectivity Benchmark Report

This report covers connectivity trends for 2020. It goes over four main key findings, including that data silos are slowing digital transformation, that organizations are reaping the benefits of APIs, that IT teams with an API strategy drive greater business outcomes, and that top-down API strategies are the most effective.

(more available)
Added: February 17, 2020
image from Data Security Portfolio Vendors, Q2 2019

Data Security Portfolio Vendors, Q2 2019

In our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee, Micro Focus, Microsoft, Oracle, Symantec, and Varonis — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals understand the respective strengths of each vendor’s portfolio.

(more available)
Added: February 12, 2020
image from 2020 Insider Threat Report

2020 Insider Threat Report

The 2020 Insider Threat Report reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders, and how organizations are preparing to better protect their critical data and IT infrastructure.

(more available)
Added: February 9, 2020
image from 2018 State of Security Operations: Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide

2018 State of Security Operations: Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide

A review of current maturity levels and practices as seen from Micro Focus’s five year history of reviewing security programs.

(more available)
Added: November 25, 2019
image from Trends for Scaling Innovation in Health Care

Trends for Scaling Innovation in Health Care

This key findings’ report contains a synopsis of trends on how health systems are scaling innovation and a look-ahead at what the innovation perspectives and strategies of today may mean for the health systems tomorrow. It is structured to provide action items for efficient scaling of innovation at health systems followed by supporting findings.

(more available)
Added: July 10, 2019
image from 10 Predictions for Developers in 2019

10 Predictions for Developers in 2019

This report provides exactly what its title offers, 10 predictions for developers in 2019.

Added: July 10, 2019
image from Boosting Organizational Success By Advancing Data Quality

Boosting Organizational Success By Advancing Data Quality

This paper will also explore the root causes of poor data quality and a solution for organizations seeking data quality improvement.

(more available)
Added: April 19, 2019
image from Enhancing Veterans' Access To Stem Education And Careers

Enhancing Veterans' Access To Stem Education And Careers

This research brief presents key highlights on recent veteran participation in the STEM workforce drawing upon an analysis of the American Community Survey (2012-2016), led by the U.S. Census Bureau. From this data, the research team examined veteran participation across 49 distinct STEM occupations, which are grouped into the following five occupational clusters: Engineering, Information Technology and Computer Science, Life and Physical Sciences, Mathematics, and Supervisor/ Management of STEM occupations. Among other analyses, the research team identified year-over-year trends in veteran participation, geographic distribution, and comparisons to non-veterans across all STEM occupations.

(more available)
Added: April 4, 2019
image from The IRA, Social Media and Political Polarization in the United State, 2012-2018

The IRA, Social Media and Political Polarization in the United State, 2012-2018

This report provided by Oxford University provides research data into the Russian involvement in the United States election process.

Added: March 26, 2019
image from What Will The Future of GRC Look Like?

What Will The Future of GRC Look Like?

From the Report, “In this new world, GRC has tremendous opportunity to add value. For instance, by pushing for higher standards of corporate governance and integrity, GRC can help a business strengthen its reputation, and inspire trust. By providing a clear picture of the regulatory landscape, GRC can help the business expand into new markets faster. And by providing timely risk intelligence on new digital technologies, GRC can help the business capitalize on upside opportunities. In short, the future of GRC lies in being an enabler of business growth and performance.”

(more available)
Added: March 6, 2019
image from Industry Report

Industry Report

This paper recognizes the growing evolution of compliance programs, and asks the question how can we use those events as a trigger for growth? They offer a few best practices that can help organizations make their compliance program an enabler for growth.

(more available)
Added: March 6, 2019
image from 2019 Connectivity Benchmark Report

2019 Connectivity Benchmark Report

MuleSoft commissioned independent market research company Vanson Bourne to survey 650 IT leaders from global enterprises to discover: › What is the state of today’s digital transformation initiatives? › How is the role of IT evolving in the customer-centric era? › What are the top challenges IT organizations face? › Which strategies are enterprises adopting to get ahead of the market?

(more available)
Added: March 1, 2019
image from A New Timescale For Fraud Science: Insights From Our CSO

A New Timescale For Fraud Science: Insights From Our CSO

From the report, “At Feedzai, we recently completed a project: building a machine learning system to perform transaction fraud detection for a global payment service provider. This client does over a million transactions a day. We designed, trained, tested, and compared hundreds of models in just over a month. In the end we achieved a 16 percentage point increase in money recall with 20x fewer alerts. The fact that we’re continuing to deliver on projects of this scale, in this speed, makes me excited for the future. In this paper, I want to discuss why speed of data science matters, why we’re able to achieve it, and why it helps us deliver value for enterprises fighting fraud. ” Read on to find out more.

(more available)
Added: February 13, 2019
image from The Future Is Now: Q1 2018 Fraud Trends Report

The Future Is Now: Q1 2018 Fraud Trends Report

From the report, “This report shares Feedzai’s original research. We found that fraudsters are attacking in methods that are faster and faster – and continuously new. The time horizon for the future of fraud has been shrinking. Today, the time horizon has shrunk to now. What does this new now look like?” Read on to find out more.

(more available)
Added: February 13, 2019
image from Money Laundering: The AI Revolution

Money Laundering: The AI Revolution

This very thorough report offers insight into how criminals take advantage of technology. It also reports on how breakthrough technologies can help financial institutions achieve better results with fewer staff.

(more available)
Added: February 13, 2019
image from The Dawn Of Machine Learning For Banking And Payments

The Dawn Of Machine Learning For Banking And Payments

From the report, “The advent of big data happened to coincide with the advent of better computing, better algorithms, and new AI-focused organizations, allowing us to take this data and turn it into something even better: meaning. This brings us to machine learning. Later in this guide, we’ll look at how machine learning works and how it can work for you. But first, let’s take a closer look at all the ingredients that got us here.” Read on to learn more.

(more available)
Added: February 13, 2019
image from A Fresh Look At Security Analytics

A Fresh Look At Security Analytics

In an interview with Tom Field, senior vice president of editorial at Information Security Media Group, Gidwani discusses: • How security analytics is commonly used today; • The potential of automation; • How orchestration impacts efficiency and scale.

(more available)
Added: February 12, 2019
image from Addressing Analyst Fatigue In The SOC

Addressing Analyst Fatigue In The SOC

This whitepaper is intended to help firms identify the symptoms of SOC Analyst fatigue, recognize the underlying causes and evaluate recommendations for addressing the problem.

(more available)
Added: February 12, 2019
image from The Power of Predictive IT

The Power of Predictive IT

This report posits the following, “When effectively harnessed, AI and ML can form the core of a dynamic predictive IT system, saving money, streamlining operations, and raising productivity as organizations become more adept at avoiding operational, and security issues that could affect their bottom line.”

(more available)
Added: February 9, 2019
image from Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware

Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware

From the report, “Machine Learning (ML) is based around the idea machines can learn from data. ML techniques have been around for a very long time. In recent years, their use has exploded thanks to advancements in elastic cloud computing and big data. Now, ML is commonly used in fields as diverse as medical research, fraud detection, smart cars, online search and electronic commerce personalization and recommendations, to name just a few. ML has recently become the shiny new object for security and is the foundational pillar of products such as next-generation antivirus (NGAV) and User and Entity Behavior Analytics (UEBA). While most of these products have promised to be a “silver bullet” against malware, complete protection remains illusive. In fact, for a number of reasons, ML is more likely to detect and cure cancer than to stop all of today’s advanced threats. As far-fetched as this may sound, a detailed look at the distinctions between cancer detection and malware detection quickly demonstrate why this statement is true. Let’s have a look at why ML will only get you so far and what you can do about it. ” Read on to find out more.

(more available)
Added: February 6, 2019
image from The Changing Face of Data Security:2019 Thales Data Threat Report Global Edition

The Changing Face of Data Security:2019 Thales Data Threat Report Global Edition

This report is based on a global IDC Web-based survey of 1,200 executives with responsibility for or influence over IT and data security. Respondents were from nine countries: Australia, Germany, India, Japan, the Netherlands, New Zealand, the UK, and the U.S., and represented a range of industries, with a primary emphasis on healthcare, financial services, retail, and federal government organizations. Job titles ranged from C-level executives including CEO, CFO, Chief Data Officer, CISO, Chief Data Scientist, and Chief Risk Officer, to SVP/VP, IT Administrator, Security Analyst, Security Engineer, and Systems Administrator. Respondents represented a broad range of organizational sizes, with the majority ranging from 500 to 10,000 employees

(more available)
Added: January 31, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)