Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

BYOD

Below you will find reports with the tag of “BYOD”

image from 2023 State of ITAM Report

2023 State of ITAM Report

High-functioning enterprises increasingly rely on ITAM practitioners to tackle new and evolving challenges. Saving money has increasingly become ITAM teams’ number one initiative, but new responsibilities don’t end there. FinOps teams, central cloud teams, security teams, ESG (environmental, social and governance) teams, ITSM teams and enterprise architecture teams are improving their business outcomes by leveraging data from ITAM teams and tools. This year’s survey is weighted more heavily toward larger companies, with 89% of respondents in organizations with more than 2,000 employees and 14% in organizations with more than 50,000 employees.

(more available)
Added: June 14, 2024
image from 2023 Global DevSecOps Report

2023 Global DevSecOps Report

Our annual survey is an opportunity to see where teams are succeeding with DevSecOps and where they might be struggling. Second, by capturing trends and movement in this market, we hope to give software development teams — from individual contributors to executives — insight into how to get the most out of their DevSecOps investments. This year’s survey respondents offered their views against the backdrop of a growing set of macroeconomic influences.

(more available)
Added: May 24, 2023
image from 2022 State of the Cloud Report

2022 State of the Cloud Report

The eleventh annual Flexera 2022 State of the Cloud Report (previously known as the RightScale State of the Cloud Report) explores the thinking of 753 respondents from a survey conducted in late 2021. It highlighted year-over-year (YoY) changes to help identify trends. The respondents global cloud decision-makers and users-revealed their experiences and insights about the public, private and multi-cloud market.

(more available)
Added: August 2, 2022
image from Cybersecurity Topics: How Employees Impact Cyber Defense

Cybersecurity Topics: How Employees Impact Cyber Defense

This survey looked at company security on the employee level, finding that many employees are not careful with their data.

(more available)
Added: December 1, 2020
image from Guardians Of The Cloud - 2019 Cloud Security Report

Guardians Of The Cloud - 2019 Cloud Security Report

This paper uses a unique and MARVEL-ous approach to provide insight into maintaining a robust cybersecurity posture in today’s fast-paced world.

(more available)
Added: September 18, 2019
image from Replace AV Buyers Guide

Replace AV Buyers Guide

Carbon Black adapts key sections from the SANS Buyer’s Guide for Endpoint Security and provides assistance for helping you assess your options.

(more available)
Added: January 1, 2019
image from Healthcare's Most Wired: National Trends 2018

Healthcare's Most Wired: National Trends 2018

Historically, the annual Most Wired research has focused on measuring adoption of healthcare information technology to highlight those organizations with the broadest, deepest IT infrastructure. With the ever-growing need to improve healthcare, the research now adds a new emphasis on measuring key areas that can help advance the industry as well as on gathering information about organizations’ technology strategies (which include not just technology adoption but also the refinement of processes and the development of people). With this new focus, this year’s research and future Most Wired research can help identify gaps in healthcare organizations’ technology adoption and strategies and highlight areas in which the industry has opportunities to make progress.

(more available)
Added: November 21, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of how mobile app security can be achieved through the technique of code injection.

(more available)
Added: October 24, 2018
image from MediaPro Best Practice Series: Battling The Forgetting Curve

MediaPro Best Practice Series: Battling The Forgetting Curve

This paper seeks to provide guidance in understanding the best ways to train employees so that the don’t forget important information.

(more available)
Added: October 23, 2018
image from The CIO's Guide To Mobile Threat Defense

The CIO's Guide To Mobile Threat Defense

This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense.

Added: October 23, 2018
image from New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

In August 2017, Cyber adAPT partnered with research and smart data firm Aberdeen Group to conduct a threat detection survey. The results provide critical data and the ability to analyze a variety of detection technology questions and scenarios.

(more available)
Added: October 21, 2018
image from Securing Health Data In A BYOD World

Securing Health Data In A BYOD World

Health Organizations are increasinly using BYOD to adminster care in their facilities. With this technological advancement comes major security concerns. This paper looks at those issues and discusses what can be done to protect Health Data.

(more available)
Added: October 19, 2018
image from An Integrated Approach To IT Troubleshooting

An Integrated Approach To IT Troubleshooting

In this paper, we will share some approaches to monitoring your IT environment and how those approaches impact troubleshooting.

Added: October 17, 2018
image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management.

(more available)
Added: October 16, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. They then outline best practices for cost-effectively mitigating risk and euring quality in life-critical deployment scenarios.

(more available)
Added: October 14, 2018
image from Beginner's Guide To Encryption

Beginner's Guide To Encryption

Device Authority’s Beginners’ Guide to Encryption is designed to help you understand the basics of how encryption works, why it matters, and what challenges are facing encryption in the new landscape of the Internet of Things (IoT).

(more available)
Added: October 14, 2018
image from Choosing A Mobile App Integration Solution

Choosing A Mobile App Integration Solution

This paper seeks to aid the reader with choosing a mobile app integration solution.

Added: October 13, 2018
© Cyentia Institute 2025
Library updated: June 24, 2025 00:08 UTC (build b1d7be4)