Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from The Future of Cloud Security

The Future of Cloud Security

Cloud security risks and vulnerabilities are on the rise and 30% of businesses fail to apply adequate security controls or provide the tools security and DevOps engineers really need to solve this problem. Unprecedented and rapid expansion to the cloud, prompted by many organizations’ digital transformation also means that cloud services are expanding faster than ever before. AWS alone has experienced over 1000% growth in services since 2013.

(more available)
Added: October 18, 2023
image from State of Cybersecurity 2023

State of Cybersecurity 2023

The ninth annual ISACA global State of Cybersecurity Survey continues to identify current challenges and trends in the cybersecurity field. For the second consecutive year, ISACA fielded questions to gain deeper insight into persistent issues in cybersecurity workforce skill sets and staffing for entry-level positions. The State of Cybersecurity 2023 report analyzes the survey results on cybersecurity skills and staffing, resources, cyberthreats and cybersecurity maturity.

(more available)
Added: October 3, 2023
image from The Business Case for Unifying Security and Observability

The Business Case for Unifying Security and Observability

Organizations are developing new applications as part of an overall movement toward digitally transforming business operations. Many executives and board members still consider these purely technology problems, but this perception is greatly mistaken. Given the potential business impact, they should accept these as business issues. Ensuring system security and resilience must be addressed as part of business planning, risk management, and operations.

(more available)
Added: September 21, 2023
image from 2023 State of Mobile App Security

2023 State of Mobile App Security

Today’s apps are multifunctional, combining communication, collaboration, and commerce. The fragmentation of mobile devices, cloud computing, and third-party components and services have changed how apps store, transmit, and process data. As a result, sensitive information is at risk thanks to the expansion of the attack surface and the rapid evolution of threats.

(more available)
Added: September 21, 2023
image from DDoS Mitigation Q3 2023 Report

DDoS Mitigation Q3 2023 Report

Quadrant Knowledge Solutions’ ‘SPARK MatrixTM: DDoS Mitigation, 2023’ research includes a detailed analysis of the global market regarding short-term and long-term growth opportunities, emerging technology trends, market trends, and future market outlook. This research provides strategic information - for technology vendors to better understand the existing market, support their growth strategies, and for users to evaluate different vendors’ capabilities, competitive differentiation, and market position.

(more available)
Added: September 18, 2023
image from Key Findings from Team8's 2023 CISO Village Survey

Key Findings from Team8's 2023 CISO Village Survey

This report presents analysis of insights gathered from 130 leading CISOs who participated in the 2023 Team8 CISO Village TLV Summit, an exclusive and intimate gathering of CISOs from global prominent enterprises, many of which are Fortune 500 companies. This report incorporates previously unpublished information gathered from the 2022 CISO Village TLV Summit Survey.

(more available)
Added: September 8, 2023
image from 2022 Data Protection Trends Report

2022 Data Protection Trends Report

As the third annual study of Data Protection Trends, this year’s survey was designed to quantify the shifts in overall concerns/goals and strategies for data protection, as well as gain an understanding of the current market landscape on data protection, disaster recovery, cybersecurity/ransomware and containers.

(more available)
Added: August 28, 2023
image from 2023 Ransomware Trends Report

2023 Ransomware Trends Report

This is the second annual survey of organizations who suffered cyberattacks with a key focus to compare the viewpoints of four different roles that are involved in cyber-preparedness and/ or mitigation: Security professionals, CISO or other IT executives, IT Operations generalists and backup administrators.

(more available)
Added: August 28, 2023
image from 2023 Identity Security Threat Landscape Report

2023 Identity Security Threat Landscape Report

Our new report examines how the interplay of all these factors will result in increased attacker opportunity. Indeed, as adversaries embrace artificial intelligence (AI) to enhance and scale their identity based attacks, security teams are being asked to do more with less as budget cuts widen existing skills and resource gaps.

(more available)
Added: August 24, 2023
image from State of Financial Service in Cloud

State of Financial Service in Cloud

The Financial Services Industry (FSI) adoption of cloud services has grown extensively in recent years and is expected to increase with further adoption and integration of cloud service provider (CSP) functions replacing traditional technology of banking, commerce, and other methods of performing financial transactions and exchanging financial data. The intention of this report was to evaluate the current state of adoption, compared to the industry’s readiness just three years ago when CSA conducted a similar survey and identify the current issues and opportunities that FSI leaders are addressing in their progression to further utilizing cloud services.

(more available)
Added: August 3, 2023
image from Security-Enabled Innovation and Cloud Trends

Security-Enabled Innovation and Cloud Trends

Expel commissioned CSA to develop a survey and report to understand better the industry’s knowledge, attitudes, and opinions regarding security’s relationship to innovation, outcomes of security-enabled innovation, and trends in cloud use. Expel financed the project and co-developed the questionnaire with CSA research analysts. The survey was conducted online by CSA in May of 2023 and received 1018 responses from IT and security professionals from organizations of various sizes and locations. CSA’s research analysts performed the data analysis and interpretation for this report.

(more available)
Added: August 3, 2023
image from The 2023 Global Study on Closing the IT Securing Gap: Addressing Cybersecurity Gaps from Edge to Cloud

The 2023 Global Study on Closing the IT Securing Gap: Addressing Cybersecurity Gaps from Edge to Cloud

The global Study on Closing the IT Security Gap: Addressing Cybersecurity Gaps from Edge to Cloud, now in its third year, is sponsored by Hewlett Packard Enterprises (HPE) to look deeply into the critical actions needed to close security gaps and protect valuable data. In this year’s research, Ponemon Institute surveyed 2,084 IT and IT security practitioners in North America, the United Kingdom, Germany, Australia, Japan, and for the first time, France. All participants in this research are knowledgeable about their organizations’ IT security and strategy and are involved in decisions related to the investment in technologies.

(more available)
Added: July 25, 2023
image from 2023 Cybersecurity Annual Report

2023 Cybersecurity Annual Report

At HPE, we believe that our individual and collective success lies in our ability to share learnings, ideas and opportunities. When it comes to securing our respective organizations, we’ve all plagued by the same challenges: a global cybersecurity skills shortage, an expanding attack surface, distributed data, and increasing demands from transparency from stakeholders. This report showcases some of the work we’ve done on that front during 2022 and some predictions for 2023.

(more available)
Added: July 25, 2023
image from 2022 Black Hat USA Survey Report

2022 Black Hat USA Survey Report

Gurucul conducted a survey of attendees at the 2022 Black Hat USA security conference focused on the Security Operations Center (SOC). We asked security professionals who worked in the SOC about what they needed to be successful, the technologies and attacks they’re most focused on, and their plans for the SOC in the next year.

(more available)
Added: July 22, 2023
image from 2023 Edge Ecosystem

2023 Edge Ecosystem

This AT&T Cybersecurity Insights report focuses on connecting and securing the entire edge computing ecosystem. This report presents a perspective that recognizes the essential characteristics of and key differences among edge architectures and provides a realistic picture of the state of edge.

(more available)
Added: July 19, 2023
image from Network Security Trends in Hybrid Cloud Environments

Network Security Trends in Hybrid Cloud Environments

ESG conducted an in-depth survey of 255 cybersecurity and IT/information security professionals familiar with their organization’s network security tools and processes and responsible for evaluating, purchasing, and/or operating corporate network security controls across public cloud infrastructure and on-premises data centers/private cloud. Survey participants represented mid-market (500 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America (United States and Canada).

(more available)
Added: July 6, 2023
image from 2023 Cloud Security Report

2023 Cloud Security Report

The 2023 Cloud Security Report is a comprehensive study based on an extensive survey conducted among 351 cybersecurity professionals in the European Union (EU). By analyzing the latest trends in cloud adoption, identifying prevalent security challenges, and highlighting best practices, this report provides insights for organizations seeking to fortify their cloud environments.

(more available)
Added: July 6, 2023
image from A CISO's Guide to Email Security in 2023

A CISO's Guide to Email Security in 2023

CISOs are facing increased challenges in an escalating threat landscape, with email as the primary target for attacks. This white paper breaks down the requirements for modern email security in protecting organizations from advanced and novel threats – moving from historically-trained tools to a behavioral, AI-driven approach.

(more available)
Added: June 29, 2023
image from State of the Cloud 2023

State of the Cloud 2023

In this data-driven report, based on our scanning of over 200,000 cloud accounts, including more than 30% of the Fortune 100 environments, we analyze the latest industry trends and developments, presenting a factual and data-based assessment of the current state and progression of cloud technology. We examine how the cloud has evolved over the past year and attempt to shed light on some of the complexity of cloud environments, including aspects such as organizational usage of multi-cloud and both managed and non-managed services.

(more available)
Added: June 20, 2023
image from The State of Cyber Assets Report 2022

The State of Cyber Assets Report 2022

In this first-ever SCAR report, we analyzed over 370 million cyber assets, findings, and policies across almost 1,300 organizations to better understand today’s cyber asset landscape. The data in this report helps security operations, engineers, practitioners and leaders understand cyber assets, liabilities, attack surfaces, and there relationships to each other in the modern enterprise.

(more available)
Added: June 19, 2023
image from The State of Cyber Assets Report 2023

The State of Cyber Assets Report 2023

In the 2023 State of Cyber Assets Report (SCAR), we analyzed over 291 million cyber assets and attributes across organizations of all sizes. These findings will help you to understand how security teams discover cyber assets, understand asset relationships, and secure their attack surfaces.

(more available)
Added: June 19, 2023
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 12:08 UTC (build b1d7be4)