Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Competitor

Below you will find reports with the tag of “Competitor”

image from Customer Communications Report

Customer Communications Report

This report is based on the survey results conducted by TeleSign. It seeks to understand how businesses are using cloud communications to fuel growth.

(more available)
Added: October 24, 2018
image from The Impact Of Customer Journey Hijacking Q4 2017

The Impact Of Customer Journey Hijacking Q4 2017

This report provides an overview of online journey hijacking based on an analysis of 500 million page views per day from top e-commerce sites across all product categories.

(more available)
Added: October 24, 2018
image from BDO 2017 Cyber Governance Survey

BDO 2017 Cyber Governance Survey

This survey was created to act as a barometer to measure the involvement of public company directors in cyber-risk management.

(more available)
Added: October 23, 2018
image from Digital Malware: Impact On The E-Commerce Market

Digital Malware: Impact On The E-Commerce Market

This report will outline benchmarks for the state of the Digital Malware problem, including the current infection rate of consumer machines, the rate of infected online sessions, causes for fluctuation, and guidance on how online businesses can protect their customer journey and win back lost revenue.

(more available)
Added: October 23, 2018
image from Six Strategies To Strengthen Your Company's Digital DNA

Six Strategies To Strengthen Your Company's Digital DNA

Digital transformation is a journey, not a destination. And every journey has a starting point. What you do next depends on where you begin. Use this self-assessment to find out where your company is today, then use the associated road map report in this playbook to help chart your course forward.

(more available)
Added: October 23, 2018
image from The Digital Business: Creating The Right IT Platform For Digital Transformation

The Digital Business: Creating The Right IT Platform For Digital Transformation

The purpose of this paper is to help CIOs and their boardroom colleagues find the right approach to building a digital infrastructure to achieve the right outcomes for their business.

(more available)
Added: October 23, 2018
image from Unlocking B2B SaaS Growth With Identity Management

Unlocking B2B SaaS Growth With Identity Management

SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.

(more available)
Added: October 22, 2018
image from Boards Turn To The Talent Agenda

Boards Turn To The Talent Agenda

This report discusses how the boards of organizations are changing their hiring practices due to the impact of cybersecurity incidents.

(more available)
Added: October 21, 2018
image from Global Blockchain Survey: Executive Summary

Global Blockchain Survey: Executive Summary

This report provides the executive summary from the Global Blockchain Survey conducted in 2018.

Added: October 21, 2018
image from Malicious Bots On Property Portals

Malicious Bots On Property Portals

The Malicious Bots on Property Portals - Avoiding Common Engineering Pitfalls eBook is the re- sult of analyses conducted on some of the top property portals (aka, real estate websites) in the world. The report outlines various hidden issues found in property portals that can be exploited to scrape data.

(more available)
Added: October 21, 2018
image from The Business Of Hacking

The Business Of Hacking

This paper will explore the business of hacking: the different ways people make money by hacking, the motivations, the organization. It will break down the businesses’ profitability and risk levels, and provide an overall SWOT analysis. From this, opportunities for disruption will be discussed and a competitive approach for disrupting the business of hacking will be laid out.

(more available)
Added: October 21, 2018
image from WAF And DDoS:Perfect Bedfellows

WAF And DDoS:Perfect Bedfellows

This short article discusses why a marriage between WAF and DDoS is a good idea.

Added: October 21, 2018
image from Combating Web Scraping In Online Businesses

Combating Web Scraping In Online Businesses

This report takes a look at the harmful practice of web scraping.

Added: October 20, 2018
image from eCommerce Threats Of 2018

eCommerce Threats Of 2018

This report discusses the malicious Bots in 2018 and how they can impact the eCommerce sector.

Added: October 20, 2018
image from 2018 Bad Bot Report:The Year Bad Bots Went Mainstream

2018 Bad Bot Report:The Year Bad Bots Went Mainstream

Focussing on Bad Bots, this report offers some updated insights into the current bad bot statistics and situations.

Added: October 19, 2018
image from 2018 Threat Predictions

2018 Threat Predictions

This is a helpful infographic that reveals threat predictions for 2018.

Added: October 19, 2018
image from 3 Steps To Mitigating Insider Threat Without Slowing Down Users

3 Steps To Mitigating Insider Threat Without Slowing Down Users

The point of this white paper is to teach folks how to leverage endpoint security to spot risk and free their users.

(more available)
Added: October 18, 2018
image from SiliVaccine: Inside North Korea's AntiVirus

SiliVaccine: Inside North Korea's AntiVirus

This article provides exclusive insight into North Korea’s Anti-Virus program.

Added: October 18, 2018
image from The Economic Impact of Cybercrime and Cyber Espionage

The Economic Impact of Cybercrime and Cyber Espionage

This report seeks to answer the following question, “Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,” or is it what others say is a “rounding error in a fourteen trillion dollar economy?””

(more available)
Added: October 18, 2018
image from Top Global Business Risks of 2016

Top Global Business Risks of 2016

The fifth annual Allianz Risk Barometer identifies the corporate perils for 2016 and beyond, based on the responses of more than 800 risk experts from 40+ countries around the globe.

(more available)
Added: October 18, 2018
image from CISO Tips: Speaking the language of business

CISO Tips: Speaking the language of business

What’s not open to discussion is that the role of information security executives has evolved. CISOs may now find themselves talking to investors about how an attack impacted quarterly earnings in addition to more traditional duties like managing a SOC.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)