Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from 2020 Cyber Security Report

2020 Cyber Security Report

Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. In this 2020 Cyber Security Annual Report, the authors offer a review of 2019’s major cyber incidents, suggest predictions for 2020, and recommend best practices to help keep organizations safe from cyber attacks.

(more available)
Added: May 21, 2020
image from Radware DDoS Protection Market Impact Report

Radware DDoS Protection Market Impact Report

This report goes in depth on Radware’s performance in mitigating DDoS attacks.

Added: May 21, 2020
image from 2020 Securonix Insider Threat Report

2020 Securonix Insider Threat Report

Insider threat continues to be a problem for organizations, regardless of size or industry. Companies are trying to mitigate this risk by continuously investing in tools, people, and processes. The Securonix Threat Research Team has analyzed hundreds of incidents across several industry verticals in order to understand the various behavior patterns that impose risk to organizations. In this report we take a closer look at such behaviors by examining reallife incidents across number of dimensions such as motive and type of risks against industry verticals.

(more available)
Added: May 21, 2020
image from Smoke and Mirrors: Do AI and Machine Learning Make a Difference in Cyber security?

Smoke and Mirrors: Do AI and Machine Learning Make a Difference in Cyber security?

It’s clear from these findings that there is still a lot of confusion around artificial intelligence and machine learning, especially in terms of these technologies’ in business cybersecurity. In spite of a small amount of regional variance, the overall results of this survey indicated a relatively even amount of skepticism across all geographies, with respect to how much benefit AI/ML brings.

(more available)
Added: May 18, 2020
image from Digital Transformation to Strategic Initiatives

Digital Transformation to Strategic Initiatives

Advice for CIOs building strategic initiatives around digital transformation.

Added: May 18, 2020
image from Trend Micro Cloud App Security Report 2019

Trend Micro Cloud App Security Report 2019

Trend Micro looks into the email security threat landscape, looking into threat types, number of threats, etc.

Added: May 18, 2020
image from Cloud companies appear to be silver lining as coronavirus dampens IT spending

Cloud companies appear to be silver lining as coronavirus dampens IT spending

COVID-19 is already beginning to weigh on corporate IT security budgets, but as millions work from home, one survey is nding a spending shift to cloud providers and security and away from PCs and servers.

(more available)
Added: May 18, 2020
image from Threat Insights Report 2020

Threat Insights Report 2020

We built our 2020 Threat Insights Report on this foundation, to help guide you in protecting against what’s to come. Because moving forward, the right combination of protections is not a difference between one cybersecurity solution or another; it’s the difference between being protected against tomorrow’s threats or becoming their prey.

(more available)
Added: May 11, 2020
image from Wireless Security: The Internet of Evil Things

Wireless Security: The Internet of Evil Things

The 2020 Internet of Evil Things survey results are in. This year we’ve polled over 200 cyber security professionals at the RSA conference in San Francisco, USA on their experience of managing wireless security, including their awareness and preparedness of wireless cyberattacks on their organization.

(more available)
Added: May 11, 2020
image from Surge in security concerns due to remote working during COVID-19 crisis

Surge in security concerns due to remote working during COVID-19 crisis

As people settle into the new way of working with many organizations working from home, it comes as no surprise that attention now turns to being productive as well as secure. In a recent survey, Barracuda found that almost half (46%) of global businesses have encountered at least one cybersecurity scare since shifting to a remote working model during the COVID-19 lockdown. What’s more, an astounding 49 percent say they expect to see a data breach or cybersecurity incident in the next month due to remote working.

(more available)
Added: May 11, 2020
image from Impact Report 2020

Impact Report 2020

As software proliferates and DevOps takes hold, we conducted this study to understand the impact of utilizing Pentest as a Service (PtaaS) vs. traditional pentesting services. Within the backdrop of modern software development practices and rising appsec priorities, our study found that DevOps is a driving force for pushing pentest into the cloud and deploying Pentest as a Service. Furthermore, DevOps demands that appsec measures are delivered in a fashion that favors communication, transparency, and collaboration- PtaaS is exactly the evolution that addresses those aspects.

(more available)
Added: May 11, 2020
image from 70% of IT Pros Cite "Consistent Data Across Systems and IT Depts." as Unified IT's #1 Benefit

70% of IT Pros Cite "Consistent Data Across Systems and IT Depts." as Unified IT's #1 Benefit

This survey looked at the state of IT departments in 2020 and where their priorities fell. After surveying more than 1,300 IT professionals, it’s clear vendor management and contract negotiation is becoming a time-consuming endeavor. In fact, 50% of IT professionals work with 11 or more vendors and nearly half (48%) spend weeks or months renegotiating their vendor contracts each year.

(more available)
Added: May 8, 2020
image from The State of Enterprise IT in 2020

The State of Enterprise IT in 2020

The following report provides insights about what did and did not change in status and viewpoints between 2019 and 2020 and why.

(more available)
Added: May 8, 2020
image from Threat Stack SOC Report Q1 2020

Threat Stack SOC Report Q1 2020

Q1 2020 was an extremely turbulent time as the world dealt with the spread of COVID-19 and many businesses shifted to a fully remote work environment for the first time. The Threat Stack Security Operations Center has had a first-hand look at the impact this has had on Threat Stack customers through our regular work investigating suspicious behavior, triaging alerts, and providing recommendations on how to proactively reduce risk and remediate incidents.

(more available)
Added: May 8, 2020
image from Untangling the Web of Cloud Security Threats

Untangling the Web of Cloud Security Threats

As more organizations move to the cloud and public cloud platforms gain more users and offer more services, cybercriminals will find ways to launch attacks and profit from compromise. As we’ve demonstrated in this research, misconfiguration in cloud services opens an organization to risks like cryptojacking, e-skimming, and data exfiltration. Container technologies in the cloud, when exposed, also pose similar risks. Finally, mismanagement of credentials and other secrets have costs that can grow as threats move across the cloud stack.

(more available)
Added: May 8, 2020
image from 2020 Cyberthreat Defense Report

2020 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great job of collecting statistics on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad actors. Our mission is the provide deep insight into the minds of IT security professionals.

(more available)
Added: May 8, 2020
image from Digital Pulse Coronavirus Flash Survey March 2020

Digital Pulse Coronavirus Flash Survey March 2020

This document is the product of a flash survey, an unscheduled, event-driven survey with a fast turnaround to cover a rapidly evolving situation relevant to tech markets. This survey was designed to measure the impact of the COVID-19 coronavirus outbreak on businesses. It was conducted between March 10 and March 19, 2020, and represents approximately 820 completes from pre-qualified IT decision-makers.

(more available)
Added: April 4, 2020
image from Cybersecurity and Resiliency Observations

Cybersecurity and Resiliency Observations

This report encourages market participants to review their practices, policies and procedures with respect to cybersecurity and operational resiliency. It states that assessing your level of preparedness and implementing some or all of the above measures will make your organization more secure. OCIE will continue to focus on working with organizations to identify and address cybersecurity risks and encourages market participants to actively engage regulators and law enforcement in this effort.

(more available)
Added: March 29, 2020
image from 2016 Cyberthreat Defense Report

2016 Cyberthreat Defense Report

A survey-based report with findings in four major areas: current security posture, perceptions and concerns, current and future investments, and practices and strategies.

(more available)
Added: March 15, 2020
image from Securing What's Now and What's Next: 20 Cybersecurity Considerations for 2020

Securing What's Now and What's Next: 20 Cybersecurity Considerations for 2020

This report by Cisco contains 20 predictions for the future of cybersecurity.

Added: March 1, 2020
image from State of the Internet / Security Vol. 6: Financial Services — Hostile Takeover Attempts

State of the Internet / Security Vol. 6: Financial Services — Hostile Takeover Attempts

This is the 6th annual SOTI from Akamai. The Key findings are: • Between November 2017 and October 2019, more than 40% of the unique DDoS targets were in the financial services industry • Traditional logins (username and password) still account for the majority (74%) of access methods to applications and services • From May to October 2019, credential stuffing attacks targeting the financial services industry have targeted APIs, often accounting for 75% or more of the total login attacks against financial services

(more available)
Added: March 1, 2020
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: August 8, 2025 20:09 UTC (build b1d7be4)