Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Competitor

Below you will find reports with the tag of “Competitor”

image from Industrial Cybersecurity Outlook 2023-2030

Industrial Cybersecurity Outlook 2023-2030

The primary goal of OT Security Leaders it to ensure that the risk of a cyber incident impacting the Reliability, Availability and Safety of operations is minimised. This requires identification and management of vulnerabilities, and a layer of controls to prevent threat actors from accessing networks. The logical starting point is to identify and classify all assets though this is rarely a simple task.

(more available)
Added: July 12, 2024
image from 2023 State of Cloud Report

2023 State of Cloud Report

The survey tapped 750 IT professionals and executive leaders worldwide representing a broad cross-section of industries and context areas in the winter of 2022. Flexera sources participants from an independent panel that is rigorously maintained and is comprised of vetted respondents with detailed profiles. At numerous points throughout the report, we’ve provided our own interpretation of the data as Flexera Points of View.

(more available)
Added: June 14, 2024
image from The 2024 State of Threat Hunting

The 2024 State of Threat Hunting

The report raises a number of interesting findings, which you’ll read about in the pages to come. However, one through line that emerges is the need for reliable threat intelligence and its impact on threat hunters’ ability to do their jobs well. Threat intelligence, or lack thereof, is a commonality across the top challenges respondents identified. Access to threat intelligence also affects nearly every aspect of how respondents say they do their jobs.

(more available)
Added: March 19, 2024
image from Executive Perspectives on Top Risks

Executive Perspectives on Top Risks

The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organization’s business model and strategy on very short notice. This report contains results from our 11th annual worldwide risk survey of directors and executives to obtain their views on the extent to which a broad collection of risks is likely to affect their organizations over the next year - 2023. We analyze variances across different sizes and types of organizations, industry and respondent position, in addition to variations among organizations based in different geographic regions.

(more available)
Added: December 19, 2023
image from DDoS Mitigation Q3 2023 Report

DDoS Mitigation Q3 2023 Report

Quadrant Knowledge Solutions’ ‘SPARK MatrixTM: DDoS Mitigation, 2023’ research includes a detailed analysis of the global market regarding short-term and long-term growth opportunities, emerging technology trends, market trends, and future market outlook. This research provides strategic information - for technology vendors to better understand the existing market, support their growth strategies, and for users to evaluate different vendors’ capabilities, competitive differentiation, and market position.

(more available)
Added: September 18, 2023
image from Annual Data Exposure Report 2023

Annual Data Exposure Report 2023

In the 2023 edition, we wanted to understand the specific challenges related to building and maintaining Insider Risk programs, technologies and training. To explore this, we surveyed 700 respondents – cybersecurity leaders, cybersecurity managers and cybersecurity practitioners – from US companies with 500 or more employees from a range of public and private sectors.

(more available)
Added: July 6, 2023
image from 2023 Insider Risk Investigations Report

2023 Insider Risk Investigations Report

This Insider Risk Investigations Report highlights the expertise of our team, who has been providing insights from real hands-on investigations since 2017. As always, we are pleased to present our findings in the spirit of sharing these insights as we work towards building greater resilience from insider risk for our customers.

(more available)
Added: June 28, 2023
image from The CEO Report on Cyber Resilience

The CEO Report on Cyber Resilience

Our CEO Report on Cyber Resilience draws on 37 interviews with CEOs of large global enterprises. It explores the role chief executives need to play in successfully managing cybersecurity risks. Our interviews with CEOs reveal that this shift to thinking about cyber resilience requires fundamental changes in approach: how they think about cybersecurity (their mindsets) and how they act (their playbooks).

(more available)
Added: June 13, 2023
image from 2023 Risk Report

2023 Risk Report

Everstream’s proprietary risk scoring model incorporates historic, present, and future risk across more than 20 major categories. Using human and artificial intelligence, we predict overall risk exposure, probability, severity, and relevance for our individual clients and end users. Every day Everstream identifies relevant events that help our clients avoid disruption, including these from 2022.

(more available)
Added: March 27, 2023
image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report reveals how organizations are responding to security threats in the cloud, and which tools and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. Cloud security concerns remain high as the adoption of public cloud computing continues to surge in the wake of the pandemic and the resulting massive shift to remote work.

(more available)
Added: October 24, 2022
image from 2022 Imperva Bad Bot Report

2022 Imperva Bad Bot Report

This report is based on data collected from the Imperva global network throughout 2021. The data is composed of hundreds of billions of blocked data bot requests, anonymized over thousands of domains. The goal os this report is to provide meaningful information and guidance about the nature and impact of these automates threats.

(more available)
Added: October 10, 2022
image from Executive Perspectives on Top Risks for 2021 & 2030

Executive Perspectives on Top Risks for 2021 & 2030

This report is based on an annual survey of boards of directors and C-suite executives about risks on the horizon for the upcoming year. It highlights top risks of immediate concern on the minds of executives for this year - 2021 - and for the long-term - 2030.

(more available)
Added: January 7, 2022
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. But they also deliver significant risk, with Remote Desktop Protocol (RDP) alone serving as the vehicle of choice for as much as 55% of ransomware attacks. This report explores how cloud-based apps – from storage services to social media apps – threaten your network security.

(more available)
Added: December 10, 2021
image from SOTI/Security - Loyalty for Sale

SOTI/Security - Loyalty for Sale

This edition of the State of the Internet (SOTI)/Security report series focuses on the retail and hospitality sectors. An extensive review of how credential abuse attacks are carried out from both a methodology perspective and a volumetric angle is given.

(more available)
Added: October 21, 2020
image from Network-layer DDoS attack trends for Q2 2020

Network-layer DDoS attack trends for Q2 2020

This report from Cloudflare shows trends and shifts in DDoS attacks for the 2nd quarter of 2020.

Added: September 25, 2020
image from 2020 State of Application Services Report

2020 State of Application Services Report

For the sixth annual State of Application Services survey, F5 heard from nearly 2,600 respondents globally— across a range of industries, company sizes, and roles—about the challenges and opportunities presented by the ongoing process of digital transformation. Their responses provide a unique view of the trends shaping the application landscape and how organizations around the world are transforming to meet the ever-changing demands of the digital economy.

(more available)
Added: June 23, 2020
image from 2020 Securonix Insider Threat Report

2020 Securonix Insider Threat Report

Insider threat continues to be a problem for organizations, regardless of size or industry. Companies are trying to mitigate this risk by continuously investing in tools, people, and processes. The Securonix Threat Research Team has analyzed hundreds of incidents across several industry verticals in order to understand the various behavior patterns that impose risk to organizations. In this report we take a closer look at such behaviors by examining reallife incidents across number of dimensions such as motive and type of risks against industry verticals.

(more available)
Added: May 21, 2020
image from The State of Application Development

The State of Application Development

This report from Outsystems is based off of a survey of over 3,300 companies. It had 5 key things they looked into: How organizations’ app dev practices adapt to meet digital transformation and agility objectives, challenges in meeting application development goals, strategies IT teams use to speed up application delivery, and if these strategies are working to overcome resource constraints and reduce backlogs.

(more available)
Added: February 12, 2020
image from The Tech Needed to Power Payments and Combat Criminals

The Tech Needed to Power Payments and Combat Criminals

Retailers can’t get paid if their payment processing doesn’t work. And if a transaction proves fraudulent, a retailer not only loses the value of the sale and the merchandise, but also risks losing the loyalty of a customer who was billed incorrectly for the purchase. Here’s a look at the essential components of payment processing that every online retailer should consider—no matter their size— in order to provide both a positive customer experience and to successfully collect payment.

(more available)
Added: February 16, 2019
image from The Faces of Friendly Fraud: Six Best Practices For Controlling The Damage

The Faces of Friendly Fraud: Six Best Practices For Controlling The Damage

This report takes a closer look at the threat of friendly fraud, by first explaining the spectrum of friendly fraud and exploring whether merchants and issuers are in fact “training” cardholders to initiate disputes. It also examines the balancing act that merchants and issuers must navigate while trying to reduce friendly fraud, while also preserving important customer relationships. Lastly, it details how two companies are addressing the problem, and then outlines six best practices for controlling the damage.

(more available)
Added: February 13, 2019
image from Solving The CNP False Decline Puzzle: Collaboration Is Key

Solving The CNP False Decline Puzzle: Collaboration Is Key

From the report, “The bottom line is that good customers who transact online are suffering a bad purchasing experience – and this is doubly harmful to both card issuers and merchants. Cardholders may elect to abandon a purchase altogether, seek a different online store to minimize purchase friction, or pull out a different card – sending their go-to card to the back of wallet. This paper explores the size of the problem, explains the destructive impact on customers who are wrongly turned away, delves into why transactions are declined and reveals how the industry currently manages declines from both a card issuer and merchant perspective. Finally, it presents some possible approaches to the problem, including several pilot programs that Ethoca currently has underway with card issuers and merchants.”

(more available)
Added: February 13, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)