Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from State of Threat Detection & Response

State of Threat Detection & Response

We wanted to gain insights into the experience of security teams who are at the helm of their organization’s detection and response operations and uncover more about what they experience each day. (more available)
Added: June 30, 2022
image from SANS 2022 Cloud Security Survey

SANS 2022 Cloud Security Survey

The goal of the SANS 2022 Cloud Security Survey is to provide additional insight into how organizations are using cloud today, the threats security teams are facing in the cloud, and what we are doing to improve security posture in the cloud, as well. (more available)
Added: June 28, 2022
image from Sysdig 2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report

In this report, you will find details about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries. (more available)
Added: June 28, 2022
image from SANS 2021 Cloud Security Survey

SANS 2021 Cloud Security Survey

The goal of the SANS 2021 Cloud Security Survey is to provide additional insights into how organizations are using the cloud today, the threats security teams are facing in the cloud, and what they’re doing to improve security posture in the cloud. (more available)
Added: June 28, 2022
image from Sysdig 2021 Container Security and Usage Report

Sysdig 2021 Container Security and Usage Report

In this report, you will find further detail about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries. (more available)
Added: June 28, 2022
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

The CDR is the most geographically comprehensive, vendor-agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches, the CDR surveys the perceptions of IT security professionals, gaining insights into how they see the world. (more available)
Added: June 23, 2022
image from Sysdig 2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report

These findings are based on the data we gather front the billions of containers that our customers run over the course of a year. (more available)
Added: June 21, 2022
image from Radware 5G Protection

Radware 5G Protection

Service providers are undergoing a technological revolution, transforming their networks and computing infrastructure to dramatically change the user experience and support new services in an app-driven world tailored to industry and business objectives. (more available)
Added: June 21, 2022
image from Ransomware Threat Report 2022

Ransomware Threat Report 2022

As these ransomware gangs and RaaS operators find new ways to remove technical barriers and up the ante, ransomware will continue to challenge organizations of all sizes in 2022. (more available)
Added: June 16, 2022
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

In the 2021 Dup Trusted Access Report, we’ll explore how companies are currently securing hybrid work and what makes a solid and secure remote access strategy. (more available)
Added: June 15, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. (more available)
Added: June 15, 2022
image from The 2019 Duo Trusted Access Report

The 2019 Duo Trusted Access Report

For The 2019 Duo Trusted Access Report, our data shows that Duo customers across all industries are starting to implement zero-trust security principles to secure their workforce. (more available)
Added: June 15, 2022
image from The State of Cybersecurity 2022 Trends

The State of Cybersecurity 2022 Trends

Arctic Wolf’s 2022 Security Trends Report provides insight into the current and future state of these cybersecurity teams as they attempt to move their security programs forward while dealing with an ever-evolving threat environment. (more available)
Added: June 10, 2022
image from State of Cybersecurity 2022

State of Cybersecurity 2022

This survey report focuses on the current trends in cybersecurity workforce development, staffing, cybersecurity budgets, threat landscape and cyber-maturity. The survey findings reinforce past reporting and, in certain instances, mirror prior year data. (more available)
Added: June 10, 2022
image from Annual Data Exposure Report 2022

Annual Data Exposure Report 2022

Today, data is a company’s most valuable asset, leading many to invest in Insider Risk Management programs. Recent trends around employee turnover and remote work have created unprecedented challenges for security teams to protect valuable data from leaving the company. (more available)
Added: June 8, 2022
image from The Cisos Report

The Cisos Report

This study offers the kind of insights CISOs have long been asking for - to benchmark their situation and experience against others; to learn from what their peers are doing and planning to do ; and to validate ideas and obtain solid data to justify investments in these areas. (more available)
Added: June 2, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

This 2022 Cloud Security Report, based on a comprehensive global survey of cybersecurity professionals, reveal these security challenges and offers insights on the state of the cloud and cloud security today. (more available)
Added: May 20, 2022
image from The State of Cloud Security 2021

The State of Cloud Security 2021

For the State of Cloud Security 2021, we surveyed 300 cloud professionals, including cloud engineers, cloud security engineers, DevOps, and cloud architects, to better understand the risks, costs, and challenges they are experiencing managing cloud security at scale. (more available)
Added: May 19, 2022
image from 2022 SaaS Security Survey Report

2022 SaaS Security Survey Report

The goal of this survey was to understand the current state of SaaS security and misconfigurations. The survey was conducted online by CSA from January to February 2022 and received 340 responses from IT and security professionals from various organization sizes and locations. (more available)
Added: May 19, 2022
image from The State of Pentesting 2019

The State of Pentesting 2019

The information included in this report is summary data from the pentesting performed in 2018. Additionally, we provide survey data from respondents in security, management, operations, DevOps, product, and developer roles. (more available)
Added: May 16, 2022
image from Learning from Incident Response: 2021 Year in Review

Learning from Incident Response: 2021 Year in Review

Secureworks incident response (IR) engagements in 2021 revealed trends about threats and threat actor behaviors. Between January and December 2021, Secureworks incident responders assisted in the containment and remediation of over 450 security incidents. (more available)
Added: April 26, 2022
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 29
  • »
  • »»
© Cyentia Institute 2022
Library updated: June 30, 2022 20:09 UTC (build d6199b1)