Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Business Application

Below you will find reports with the tag of “Business Application”

image from IT and Security Convergence Report 2024

IT and Security Convergence Report 2024

The target population was reached through in-person events, and by third parties via their opt-in email lists, Genetec opt-in email lists, and by digital promotions. This report points out whether answers are from all respondents, end user respondents, or channel partner respondents.

(more available)
Added: May 31, 2024
image from 2024 State of Software Security Report

2024 State of Software Security Report

This report represents organizations that are proactively integrating tools like Veracode into their AppSec programs. Organizations without scanning integrated into their development processes will likely have a higher prevalence of security flaws than shown here. The results do show a steady downward trend over the last eight years. We’re particularly encouraged to see that the prevalence of high-severity flaws has dropped to half of what it was back in 2016.

(more available)
Added: May 2, 2024
image from 2024 Secure Cloud Networking Field Report

2024 Secure Cloud Networking Field Report

This survey conducted by Aviatrix explores the trends impacting global cloud, networking, and security practitioners, and how they’re impacting the bottom line for enterprises worldwide. This report will look more closely at the causes and impacts of these findings, as well as recommendations for improving enterprise and industry outcomes in the future.

(more available)
Added: April 22, 2024
image from Cybersecurity in the Remote Work Era: A Global Risk Report

Cybersecurity in the Remote Work Era: A Global Risk Report

COVID-19 has dramatically changed the workplace and has created new cybersecurity risks and exacerbated existing risks. The purpose of this research, sponsored by Keeper Security, is to understand the new challenges organizations face in preventing, detecting and containing cybersecurity attacks in what is often referred to as “the new normal”. All respondents in this research are in organizations that have furloughed or directed their employees to telework because of COVID-19.

(more available)
Added: December 15, 2023
image from The State of Segmentation 2023

The State of Segmentation 2023

As the findings in this report show, these attacks are also having a greater impact, adding to pressure on security leaders to choose the right solutions and keep the entire environment safe, without sacrificing overall performance or innovation. The 1,200 respondents agreed overwhelmingly on the effectiveness of segmentation in keeping assets protected, but their overall progress in deploying it around critical business applications and assets was lower than expected.

(more available)
Added: November 6, 2023
image from The Business Case for Unifying Security and Observability

The Business Case for Unifying Security and Observability

Organizations are developing new applications as part of an overall movement toward digitally transforming business operations. Many executives and board members still consider these purely technology problems, but this perception is greatly mistaken. Given the potential business impact, they should accept these as business issues. Ensuring system security and resilience must be addressed as part of business planning, risk management, and operations.

(more available)
Added: September 21, 2023
image from 2023 Identity Security Threat Landscape Report

2023 Identity Security Threat Landscape Report

Our new report examines how the interplay of all these factors will result in increased attacker opportunity. Indeed, as adversaries embrace artificial intelligence (AI) to enhance and scale their identity based attacks, security teams are being asked to do more with less as budget cuts widen existing skills and resource gaps.

(more available)
Added: August 24, 2023
image from 2021 Application Security Report

2021 Application Security Report

This report reveals that the expanded use of applications for business-critical applications, combined with the increased pace of application changes that come with DevOps methodologies, has created security challenges for organizations.

(more available)
Added: October 18, 2022
image from VPN Risk Report 2021

VPN Risk Report 2021

The 2021 VPN Risk Report surveyed 357 cybersecurity professionals, providing insight into the current remote access environment, the state of VPN within the enterprise, the rise in VPN vulnerabilities, and the role that zero trust will play in enabling access to apps going forward.

(more available)
Added: September 29, 2022
image from VPN Risk Report

VPN Risk Report

This report is based on the results of a comprehensive online survey of 351 IT and cybersecurity professionals, conducted in June 2022 to identify the latest enterprise adoption trends, challenges, gaps, and solution preferences related to VPN risk. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: September 26, 2022
image from State of Ransomware Preparedness 2022

State of Ransomware Preparedness 2022

The scourge of ransomware has resulted in an entire ecosystem necessary to combat its spread and prevent organizations from becoming victims of an increasingly motivated set of criminals. Our research, which gleaned insights from close to 400 survey responses in July of 2022, provides key data points that infer strong correlation between organizations with board involvement in ransomware preparedness and positive outcomes related to it.

(more available)
Added: September 12, 2022
image from Taking control of security operations

Taking control of security operations

The threat landscape is constantly evolving- and the tools you used to protect your business yesterday certainly won’t keep you safe tomorrow. In this white paper, you’ll learn three ways an intelligent, integrated approach can streamline your security operations.

(more available)
Added: June 30, 2022
image from Radware 5G Protection

Radware 5G Protection

Service providers are undergoing a technological revolution, transforming their networks and computing infrastructure to dramatically change the user experience and support new services in an app-driven world tailored to industry and business objectives. To do so, service providers are embracing ultra-low-latency designs, fully automated software delivery and increased levels of operating efficiency.

(more available)
Added: June 21, 2022
image from Mobile Banking Heists: The Global Economic Threat

Mobile Banking Heists: The Global Economic Threat

In this report, we examine 10 prolific banking trojans targeting Android mobile apps of users worldwide, detailing their features and capabilities. We also detail what makes each malware family different highlighting the unique and advanced malicious features that make each banking trojan family unique. A complete list of all 639 financial applications covering banking, investment, payment, and cryptocurrency services and the different banking trojan families targeting each is provided in Appendix A.

(more available)
Added: June 21, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. They’re also implementing the appropriate security controls to ensure secure access to applications. In this report, we’ll look at how companies are currently securing remote work and what makes a solid and secure remote access strategy.

(more available)
Added: June 15, 2022
image from 2022 SaaS Security Survey Report

2022 SaaS Security Survey Report

The goal of this survey was to understand the current state of SaaS security and misconfigurations. The survey was conducted online by CSA from January to February 2022 and received 340 responses from IT and security professionals from various organization sizes and locations. CSA’s research team performed the data analysis and interpretation for this report.

(more available)
Added: May 19, 2022
image from Understanding XDR Requirements: What XDR Is and Why Organizations Need It

Understanding XDR Requirements: What XDR Is and Why Organizations Need It

CISOs aren’t alone in recognizing the need for new threat detection and response strategies. In fact, security technology providers are championing a new technology initiative dubbed eXtended Detection and Response (XDR). XDR tools are intended to solve many threat detection and response issues by providing an integrated security architecture, advanced analytics, and simplified operations. Despite this innovation, however, users remain confused about XDR and where it could fit into their security programs. This report answers “what is XDR and which are the most important XDR requirements?”

(more available)
Added: January 24, 2022
image from The State of Cloud Native Security Report 2022

The State of Cloud Native Security Report 2022

Palo Alto Networks surveyed 3,000 cloud security and DevOps professionals from around the world to gain insight into organizations’ cloud adoption strategies, budgets, experiences, and future plans.

(more available)
Added: January 20, 2022
image from Identity and Access Management: The Stakeholder Perspective

Identity and Access Management: The Stakeholder Perspective

This report aims to capture hard data on the experiences of stakeholders who are impacted by IAM processes and technologies, and the impact of current IAM practices on security risks and business operations.

(more available)
Added: February 22, 2021
image from Internet Risk Surface in the Financial Sector

Internet Risk Surface in the Financial Sector

A deep dive into the nature of the finance sector’s public risk surface. Reviewing subsectors of the finance ecosystem, including supply chains.

(more available)
Added: December 9, 2020
image from 2020 End User Phishing Report: Business Beware

2020 End User Phishing Report: Business Beware

This report is based on the results of a comprehensive interactive survey of 1,123 users in the United States, conducted in September 2020, who received 10 emails and were asked to identify whether each email was authentic or a phishing attack. The results provide insights into the latest trends in user behavior, challenges and gaps related to phishing attacks.

(more available)
Added: October 20, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 08:08 UTC (build b1d7be4)