Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloud

Below you will find reports with the tag of “Cloud”

image from 2023 Ransomware and the Modern SOC

2023 Ransomware and the Modern SOC

In the new Cybereason survey, 1,203 cybersecurity professionals from eight countries and a dozen industries were asking to describe the challenges currently faced by their SOCs and how they impact their plans for modernization. Nearly half of the respondents (49%) said ransomware is the most common incident type they deal with daily, followed closely by supply chain attacks (46%). Thirty-seven percent said daily alerts consumed most of their time, and 31% identified targeted attacks as a top daily concern.

(more available)
Added: March 16, 2023
image from Cyber Security Trends Forecast 2023

Cyber Security Trends Forecast 2023

The cybercrime industry is very dynamic and develops and morphs daily. As a result, new trends keep on emerging that demand us to be on top of things in order to keep our organizations safe and secure. This report will focus on all the major and relevant security trends of 2022 that we can learn from, as well as what can we conclude and predict about how these threats could reveal themselves and change in 2023.

(more available)
Added: March 7, 2023
image from Meta - Curious Organizations Relay Cybersecurity Concerns Even As They Plunge Into Virtual Worlds

Meta - Curious Organizations Relay Cybersecurity Concerns Even As They Plunge Into Virtual Worlds

The study, conducted by Opinion Matters on behalf of Tenable, surveyed 1,500 professionals representing roles in cybersecurity, DevOps and IT engineering. The study offers insights into what organizations perceive as the greatest risks and reward of investing in the metaverse and the level of development required to take such as major step safely.

(more available)
Added: March 6, 2023
image from 2023 Global Threat Report

2023 Global Threat Report

The report shows that security must parallel the slope of technology innovation. As technology matures, security has to mature and match the innovation of the technology running our organizations. The same thing can be said for the adversary. With every innovation we achieve, we can expect the adversary to actively seek ways to exploit it. From the cloud to Kubernetes, from Al to applications and more, as technology gets more complex and provides tremendous operational gains, security must evolve to protect the productivity we gain.

(more available)
Added: March 3, 2023
image from State of Cloud Threat Detection and Response Report March 2023

State of Cloud Threat Detection and Response Report March 2023

Our State of Cloud Threat Detection and Response report summaries the survey responses of 400 security leaders and SecOps practitioners in North America regarding the capabilities, practices, and behaviors of protecting against, identifying, and remediating cloud-based threats. The report looks at the differences between cloud threats detection and response behaviors and their on-premises counterparts, and the connection between cloud transformation and security transformation. We conclude with guidance on how to incorporate these lessons into your company’s current operations and considerations for the future.

(more available)
Added: March 3, 2023
image from State of Enterprise Cybersecurity: Invest Now, or Pya Big Later

State of Enterprise Cybersecurity: Invest Now, or Pya Big Later

In this report, we analyze data from Dark Reading’s survey that shows how security teams are struggling to keep up with the transformational changes to their business model and infrastructure. Many are partnering with security service providers, but they often struggle to get the most value from these partnerships. We show how organizations can optimize - and get the most out of - the relationships with their security solution provider partners.

(more available)
Added: March 1, 2023
image from Threat Report T2 2022

Threat Report T2 2022

In T2 2022, we saw the continuation of the sharp decline of Remote Desktop Protocol (RDP) attacks, which likely continued to lose their steam due to the Russia-Ukraine war, along with the post- COVOD return to offices and overall improved security of corporate environments. Even with declining numbers, Russia IP addresses continued to be responsible for the large portion of RDP attacks.

(more available)
Added: February 22, 2023
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great job of collecting statistics on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad actors. Our mission is to provide deep insight into the minds of IT security professionals.

(more available)
Added: February 21, 2023
image from The Biggest Cyber Security Threats Coming in 2022

The Biggest Cyber Security Threats Coming in 2022

Our findings should serve as a wake-up call to both the mid-market segment and the cyber security industry that is currently underserving it. In just the past two years, attacks against mid-sized companies overall have increased by 150%, with attacks against specific sectors ranging from just about doubling to nearly tripling over that two-year period. At the same-time, mid-market companies’ defenses against these growing attacks have not kept pace.

(more available)
Added: February 17, 2023
image from Great eXpeltations: Cyber trends and predictions 2023

Great eXpeltations: Cyber trends and predictions 2023

This report, co-authored by our security operations center (SOC) leadership team, aggregates data from the incidents we investigated in 2022. It covers our full customer base, from small and midsize companies to enterprise organizations at every phase of the security journey across every industry we serve.

(more available)
Added: February 15, 2023
image from Ericsson Mobility Report

Ericsson Mobility Report

By the end of 2022, 5G subscriptions are expected to reach 1 billion, and more smart 5G devices with additional capabilities are expected in the market during 2023. Our outlook for 2028 is that 5G subscriptions will pass 5 billion and Fixed Wireless Access (FWA) connections will reach 200 million, where 5G will account for almost 80 percent of FWA connections.

(more available)
Added: February 15, 2023
image from Sysdig 2023 Cloud-Native Security and Usage Report

Sysdig 2023 Cloud-Native Security and Usage Report

This report is based on data gathered from billions of containers, thousands of cloud accounts, and hundreds of thousands of applications that our customers operated over the course of the last year. Our findings provide signs of hope for overburdened developers, as the data showed opportunities to focus remediation efforts on vulnerable packages loaded at runtime.

(more available)
Added: February 7, 2023
image from Cyber Threat Index 2023

Cyber Threat Index 2023

This report includes insights on internet security, cyber risk, and security trends that organizations have face over the last year and what they need to prepare for in 2023. We’re sharing the critical information and our insights to help decision-makers in the information security community and insurtech sectors better understand the cyber risk landscape. Coalition’s data set includes internet scans of 5.2 billion IP addresses-an impressive number that comprises the entire IPv4 address space and relevant IPv6 addresses.

(more available)
Added: February 3, 2023
image from Close Encounters of the Third (and Fourth) Party Kind

Close Encounters of the Third (and Fourth) Party Kind

This report offers an in-depth examination of the underlying condition that enables such incidents to take place-the widespread interdependence of modern digital supply chains. We analyzed data from over 230,000 organizations to investigate the prevalence of security incidents among third parties. We then measure the extent of vendor relationships and explore the effects of that exposure. Finally, we compare the security posture of organizations to that of their third and fourth-parties to yield data-driven insights on how to identify risky vendors and better manage exposure.

(more available)
Added: February 1, 2023
image from The Total Economic Impact Of Mimecast

The Total Economic Impact Of Mimecast

This study documents and quantifies how Mimecast protects organizations against threats. Cybercrime affects every organization no matter the size or type, and it’s a threat that is growing and changing constantly.

(more available)
Added: January 30, 2023
image from 2023 Insider Threat Report

2023 Insider Threat Report

The 2023 Insider Threat Report surveyed over 326 cybersecurity professionals to reveal the latest trends and challenges facing organizations in this changing environment. The report explores their critical data and IT infrastructure. New report from Cybersecurity Insiders and Gurucul shows growing risk from insider from insider attacks as they become more frequent and more difficult to detect, raising concern by security pros.

(more available)
Added: January 27, 2023
image from 2023 State of Security Report

2023 State of Security Report

The 2023 State of Security Report surveyed over 240 cybersecurity professionals from North American to reveal the key challenges cybersecurity teams are facing, how they solve cyber issues, and the security technologies organizations prioritize.

(more available)
Added: January 23, 2023
image from 2023 Security Service Edge Adoption Report

2023 Security Service Edge Adoption Report

The 2023 Security Service Edge Adoption Report delivers insight on the shift away from legacy access solutions and the rapidly growing SSE market in light of the modern workplace.

(more available)
Added: January 23, 2023
image from 2023 Cybersecurity Status Report

2023 Cybersecurity Status Report

Ivanti surveyed over 6,500 executives leaders, cybersecurity professionals and office workers in October 2022. Our goal: to understand today’s threats - from the perspective of security professionals, as well as executive leaders and all other office workers - plus find out how companies are preparing for yet - unknown future threats.

(more available)
Added: January 11, 2023
image from 2022 Securonix Threat Report

2022 Securonix Threat Report

The 2022 Securonix Threat Report highlights the trends, required data, and detection summaries for key trends. Additionally, our report covers the techniques we’ve seen from the trenches across insider threat, cloud infrastructure misuse/abuse, and preemptive ransomware detection. Finally, we added a new section in this report covering loT/OT.

(more available)
Added: January 11, 2023
image from January 2023 Threat Horizon Report

January 2023 Threat Horizon Report

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from throughout Google’s intelligence and security teams.

(more available)
Added: January 11, 2023
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)