Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from Q1 2018 Datavisor Fraud Index Report

Q1 2018 Datavisor Fraud Index Report

The DataVisor Fraud Index Report: Q1 2018 is based on attacks that were detected by the DataVisor UML Engine from January through March of 2018, analyzing 40 billion events and 680 million user accounts. This report provides unprecedented insights into the attack techniques that bad actors use to engage in malicious activities and evade detection.

(more available)
Added: February 5, 2019
image from Q3 2018 DataVisor Fraud Index Report: Unraveling The Matrix Of Fraud

Q3 2018 DataVisor Fraud Index Report: Unraveling The Matrix Of Fraud

The Q3 2018 Fraud Index Report, produced by the DataVisor Research Team, analyzes recent fraud attacks impacting consumers and organizations for the period July - September 2018.

(more available)
Added: February 5, 2019
image from SIEM Report

SIEM Report

The 2019 SIEM Survey Report represents one of the most comprehensive surveys on SIEM to date, designed to explore the latest trends, key challenges, and solution preferences for SIEM.

(more available)
Added: January 31, 2019
image from The Future Of Cybercrime & Security

The Future Of Cybercrime & Security

This report offers insight into both Cybercrime and Cybersecurity. It discusses IoT botnets and DDoS, Rising Ransomware, File-less Attacks, and on the security side, it discusses Talent 7 Budget Shortage, Government opinions, Pervasive Threat Intelligence and Market Consolidation.

(more available)
Added: January 31, 2019
image from EMA Radar for Digital Threat Intelligence Management: Q4 2017

EMA Radar for Digital Threat Intelligence Management: Q4 2017

This report offers insight into digital threat intelligence management.

Added: January 31, 2019
image from The Changing Face of Data Security:2019 Thales Data Threat Report Global Edition

The Changing Face of Data Security:2019 Thales Data Threat Report Global Edition

This report is based on a global IDC Web-based survey of 1,200 executives with responsibility for or influence over IT and data security. Respondents were from nine countries: Australia, Germany, India, Japan, the Netherlands, New Zealand, the UK, and the U.S., and represented a range of industries, with a primary emphasis on healthcare, financial services, retail, and federal government organizations. Job titles ranged from C-level executives including CEO, CFO, Chief Data Officer, CISO, Chief Data Scientist, and Chief Risk Officer, to SVP/VP, IT Administrator, Security Analyst, Security Engineer, and Systems Administrator. Respondents represented a broad range of organizational sizes, with the majority ranging from 500 to 10,000 employees

(more available)
Added: January 31, 2019
image from DevOps Beware: Your Servers Are Open For Business

DevOps Beware: Your Servers Are Open For Business

In this report, you’ll learn how many DevOps servers may be exposed based on a study done by the IntSights research team, how cyber criminals typically access open DevOps servers, and what you can do to protect yourself and your data from a DevOps cyber attack.

(more available)
Added: January 25, 2019
image from Gaming And Leisure Cyber Security Benchmarking Report

Gaming And Leisure Cyber Security Benchmarking Report

IntSights provides the industry’s most comprehensive view into internal and external threats facing the Gaming and Leisure industry. This report will demonstrate and classify threats that are actively underway, or being planned. This will enable security teams to better resource and fortify their infrastructure against attacks.

(more available)
Added: January 25, 2019
image from The 5 Foundational DevOps Practices: How To Establish And Build On Them

The 5 Foundational DevOps Practices: How To Establish And Build On Them

From the report, “The Puppet 2018 State of DevOps Report took a new tack this year, seeking prescriptive guidance for teams to follow. We designed our survey to learn how organizations progress through their DevOps journeys, and after analyzing the data, we found that the successful ones go through specific stages. Our research also revealed a set of core practices — we call them “foundational practices” — that are critical to success throughout the entire DevOps evolution. In this paper, we’ll take you through an in-depth description of these foundational practices, and offer you our advice for how to begin instituting them in the way that makes most sense for your organization, based on our findings.”

(more available)
Added: January 24, 2019
image from Pervasive Automation Report

Pervasive Automation Report

From the report, “Much like DevOps itself, pervasive automation is equal parts process, tooling, and culture. Taking the journey represents a collective commitment by the entire organization, one where the goal is realizing the competitive advantage offered by software automation. Leadership builds the strategy, managers plan how to get there, and then it’s up to the teams to sustain an ongoing effort. New challenges will arise as new technologies are released: cloud services, containers, and server-less computing for example. Automating processes to adapt to tomorrow’s technology means staying on the path toward pervasive automation. Then, deliver the business value and agility it promises. While it’s impossible to get to an “absolutely” automated state, this journey keeps you as close as possible by continuously leveraging the latest DevOps and automation practices across your organization.”

(more available)
Added: January 24, 2019
image from The State of Enterprise Encryption and How to Improve It

The State of Enterprise Encryption and How to Improve It

A new survey by UBM and Vera Security explores the use of encryption and access controls to understand how organizations currently use these technologies and to identify their top priorities in file security. The results of this research establish the reasons why encryption isn’t more widely used and considers how organizations can use this technology effectively to ensure the protection of their data.

(more available)
Added: January 17, 2019
image from State of Application Services 2019 Report

State of Application Services 2019 Report

From the report, “For our fifth annual survey, we asked nearly 2,000 respondents globally across a range of industries, company sizes, and roles—about the challenges and opportunities presented by the ongoing process of digital transformation. This survey provides a uniquely comprehensive analysis of the trends shaping the application landscape—and how IT organizations are transforming to meet the ever-changing demands of the digital economy.”

(more available)
Added: January 17, 2019
image from 2018 Secure DevOps: Fact Or Fiction?

2018 Secure DevOps: Fact Or Fiction?

This survey, the sixth in a series of annual studies by SANS on security practices in software development, is the first to explicitly focus on DevOps. The results of this study show that organizations are finding ways to keep up with rapid change through DevOp but they have a number of challenges they still need to deal with.

(more available)
Added: January 16, 2019
image from The Trust Factor: Cybersecurity's Role in Sustaining Business Momentum

The Trust Factor: Cybersecurity's Role in Sustaining Business Momentum

To provide insights into the complex challenges faced by organizations as they fight to protect their brands, Radware produces an annual Global Application & Network Security Report. This eighth annual version of the report combines Radware’s organic research, real attack data and analyses of developing trends and technologies with the findings from a global industry survey.

(more available)
Added: January 16, 2019
image from Facing Forward: Cyber Security in 2019 and Beyond

Facing Forward: Cyber Security in 2019 and Beyond

From the report, “In the cyber security industry, we’re so frequently working around-the-clock for days at a time that we often forget when one year ends and another begins. It’s a shame, too, because the end of the year is a very important time. It provides a moment to reflect on what we observed and experienced over the past 12 months, and to consider how best to address the challenges we have been facing. Perhaps more critical to our line of work, it offers an opportunity to note what developed into a trend, and what might develop into a trend as we move into the next year and beyond.”

(more available)
Added: January 15, 2019
image from Mapping The Future: Trend Micro Security Predictions For 2019

Mapping The Future: Trend Micro Security Predictions For 2019

From the report, “In 2019 and beyond, the biggest trends expected to have an impact on technology and security are the advances in artificial intelligence and machine learning brought about by the ever-growing volume of data that can be processed and analyzed; the continued adoption of cloud computing by enterprises the world over; and the developments in smart devices, homes, and factories — to say nothing of the looming 2020 rollout of 5G, the latest phase of mobile communications geared toward further increasing internet speeds. Furthermore, 2019 will be an important year for political developments including the finalization of Brexit and the holding of landmark elections in several countries. These technological and sociopolitical changes will have a direct impact on security issues in 2019.”

(more available)
Added: January 15, 2019
image from Asssessing the DNS Security Risk

Asssessing the DNS Security Risk

Ponemon Institute is pleased to present the findings of Assessing the DNS Security Risk, sponsored by Infoblox. The purpose of this study is to understand the ability of organizations to assess and mitigate DNS risks. As part of the research, an online index has been created to provide a global measure of organizations’ exposure to DNS security risks and assist them in their response to DNS security risks.

(more available)
Added: January 15, 2019
image from Definitive Guide To Azure Security

Definitive Guide To Azure Security

While popular out-of-the-box SaaS products like Salesforce, Box, Dropbox, and Office 365 are becoming common in the workplace, many enterprises have business needs that require custom-made applications.

(more available)
Added: January 15, 2019
image from The Impact Of Cloud On ERP

The Impact Of Cloud On ERP

The “Impact of Cloud on ERP” survey report was designed to assess the impact of ERP solutions on organizations and better understand cloud preparation and data migration needs to implement ERP solutions in the cloud. Features and benefits gained, security and privacy challenges, and time to deploy for an ERP Solution in a cloud environment were explored.

(more available)
Added: January 15, 2019
image from Cyber Intrusion Services Casebook 2018

Cyber Intrusion Services Casebook 2018

From the report, “This casebook presents some of the findings and recommendations we’ve made in key engagements across a representative sample of the work we performed last year. We dig into: Emerging and notable trends, Examples of ill-prepared organizations and the devastating effects of the breaches they suffered, Essential recommendations to prevent companies from becoming another statistic of poor security planning and execution. This casebook also underscores the expertise of our team and the important work we’re doing at CrowdStrike® Services. As you read the case studies, you will see that CrowdStrike stands shoulder-to-shoulder with our clients as we work together to stop adversaries and repair damage. But this casebook is not just for CrowdStrike clients — we want everyone to become better prepared to overcome their adversaries in 2019.”

(more available)
Added: January 15, 2019
image from Cybersecurity Insights Volume 8: Charting A New Course

Cybersecurity Insights Volume 8: Charting A New Course

In the summer of 2018, AT&T Business and Spiceworks performed a research study with 250 IT leaders. The research revealed that 99% of organizations have a security risk management strategy. However, there is a sharp performance divide between the organizations confident in their risk management strategies (42% called the “Confident Investors”) and organizations who are not (57% called the “Unconfident Investors”).

(more available)
Added: January 15, 2019
  • ««
  • «
  • 17
  • 18
  • 19
  • 20
  • 21
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 14, 2025 08:09 UTC (build b1d7be4)