Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Competitor

Below you will find reports with the tag of “Competitor”

image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report reveals how organizations are responding to security threats in the cloud, and which tools and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. (more available)
Added: October 24, 2022
image from 2022 Imperva Bad Bot Report

2022 Imperva Bad Bot Report

This report is based on data collected from the Imperva global network throughout 2021. The data is composed of hundreds of billions of blocked data bot requests, anonymized over thousands of domains. (more available)
Added: October 10, 2022
image from Executive Perspectives on Top Risks for 2021 & 2030

Executive Perspectives on Top Risks for 2021 & 2030

This report is based on an annual survey of boards of directors and C-suite executives about risks on the horizon for the upcoming year. (more available)
Added: January 7, 2022
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. (more available)
Added: December 10, 2021
image from SOTI/Security - Loyalty for Sale

SOTI/Security - Loyalty for Sale

This edition of the State of the Internet (SOTI)/Security report series focuses on the retail and hospitality sectors. An extensive review of how credential abuse attacks are carried out from both a methodology perspective and a volumetric angle is given. (more available)
Added: October 21, 2020
image from Network-layer DDoS attack trends for Q2 2020

Network-layer DDoS attack trends for Q2 2020

This report from Cloudflare shows trends and shifts in DDoS attacks for the 2nd quarter of 2020.
Added: September 25, 2020
image from 2020 State of Application Services Report

2020 State of Application Services Report

For the sixth annual State of Application Services survey, F5 heard from nearly 2,600 respondents globally— across a range of industries, company sizes, and roles—about the challenges and opportunities presented by the ongoing process of digital transformation. (more available)
Added: June 23, 2020
image from 2020 Securonix Insider Threat Report

2020 Securonix Insider Threat Report

Insider threat continues to be a problem for organizations, regardless of size or industry. Companies are trying to mitigate this risk by continuously investing in tools, people, and processes. (more available)
Added: May 21, 2020
image from The State of Application Development

The State of Application Development

This report from Outsystems is based off of a survey of over 3,300 companies. It had 5 key things they looked into: How organizations’ app dev practices adapt to meet digital transformation and agility objectives, challenges in meeting application development goals, strategies IT teams use to speed up application delivery, and if these strategies are working to overcome resource constraints and reduce backlogs. (more available)
Added: February 12, 2020
image from The Tech Needed to Power Payments and Combat Criminals

The Tech Needed to Power Payments and Combat Criminals

Retailers can’t get paid if their payment processing doesn’t work. And if a transaction proves fraudulent, a retailer not only loses the value of the sale and the merchandise, but also risks losing the loyalty of a customer who was billed incorrectly for the purchase. (more available)
Added: February 16, 2019
image from The Faces of Friendly Fraud: Six Best Practices For Controlling The Damage

The Faces of Friendly Fraud: Six Best Practices For Controlling The Damage

This report takes a closer look at the threat of friendly fraud, by first explaining the spectrum of friendly fraud and exploring whether merchants and issuers are in fact “training” cardholders to initiate disputes. (more available)
Added: February 13, 2019
image from Solving The CNP False Decline Puzzle: Collaboration Is Key

Solving The CNP False Decline Puzzle: Collaboration Is Key

From the report, “The bottom line is that good customers who transact online are suffering a bad purchasing experience – and this is doubly harmful to both card issuers and merchants. (more available)
Added: February 13, 2019
image from Cisco 2018 Privacy Maturity Benchmark Study

Cisco 2018 Privacy Maturity Benchmark Study

The Cisco 2018 Privacy Maturity Benchmark Study was created in conjunction with Cisco’s Annual Cybersecurity Benchmark Study, a double-blind survey completed by more than 3600 security professional in 25 countries and across all major industries. (more available)
Added: February 12, 2019
image from H1 2018 Report: The State Of Online Journey Hijacking

H1 2018 Report: The State Of Online Journey Hijacking

Online Journey Hijacking, a client-side phenomenon where unauthorized ads are injected into consumer browsers, is a growing yet invisible problem for eCommerce sites. (more available)
Added: February 6, 2019
image from Online Consumer Behavior: Optimizing the Journey for Today's Multi-Tasking Shopper

Online Consumer Behavior: Optimizing the Journey for Today's Multi-Tasking Shopper

From the report, “Technology has dramatically changed the online experience for consumers — and along with this their expectations. Be it for business or pleasure, digital platforms continue reshaping the way consumers interact and engage with each other, as well as with online brands. (more available)
Added: February 6, 2019
image from 2018 eCommerce Holiday Season Data Recap

2018 eCommerce Holiday Season Data Recap

From the report, “As the dust settles after the 2018 holiday shopping season, online retailers and eCommerce businesses will be diving deep into the results to measure just how effectively their online promotional campaigns capitalized on the opportunity - and translated increased traffic into more revenue and improved conversion rates. (more available)
Added: February 6, 2019
image from The Marriott Breach - A Classic Insider Threat that Behavioral Analysis Immediately Identifies

The Marriott Breach - A Classic Insider Threat that Behavioral Analysis Immediately Identifies

Insider threats, such as those associated with the Marriott breach, are considered one of the top concerns in IT security due to the devastating impact on business, reputation, loss of sensitive data, and significant fines. (more available)
Added: February 5, 2019
image from EMA Radar for Digital Threat Intelligence Management: Q4 2017

EMA Radar for Digital Threat Intelligence Management: Q4 2017

This report offers insight into digital threat intelligence management.
Added: January 31, 2019
image from The 5 Stages of DevOps Evolution: A Guide For CIOs

The 5 Stages of DevOps Evolution: A Guide For CIOs

From the report, “This year we designed our DevOps survey to reveal what successful organizations actually do as they progress on their DevOps journeys. (more available)
Added: January 24, 2019
image from 2017 State Of The Software Supply Chain

2017 State Of The Software Supply Chain

This 2017 report has similarities to previous years, but there are three differences worth noting. First, the analysis in this year’s report extends beyond Java and includes supply chain findings for JavaScript, NuGet, Python, and Docker. (more available)
Added: January 15, 2019
image from State of the Internet 2018

State of the Internet 2018

In this issue of the State of The Internet/Security report, they take a look back at some of the events they were a part of and the research the Akamai teams produced in the past 12 months. (more available)
Added: December 14, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 1, 2023 20:09 UTC (build 051771c)