Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Competitor

Below you will find reports with the tag of “Competitor”

image from Cyber Security in the Boardroom

Cyber Security in the Boardroom

The, NYSE Governance Services, in partnership with Veracode, surveyed nearly 200 directors of public companies representing a variety of industries—including financial services, technology, and health care—to discover how they view cybersecurity in the boardroom. Their goal was to gain insight into how cybersecurity is being understood, prioritized, and addressed at the board level.

(more available)
Added: October 17, 2018
image from United Kingdom - Views From The C-Suite Survery 2018

United Kingdom - Views From The C-Suite Survery 2018

All available industry statistics show that cybersecurity attacks and breaches continue to rise—so how prepared are UK companies to manage cyberattacks? In this survey we asked organisations about their plans for investment and about how well they think they are managing cyber risk.

(more available)
Added: October 17, 2018
image from Energy Market Review 2014

Energy Market Review 2014

This report seeks to understand, and analyze, whether or not the energy market can respond to a damaging cyber attack.

(more available)
Added: October 16, 2018
image from Security Response: The Apple Threat Landscape

Security Response: The Apple Threat Landscape

This report examines the weaknesses in Apple products and the growing trend of attacks on the Apple system.

Added: October 16, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

The fifth annual State of DevOps Report confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns.

(more available)
Added: October 15, 2018
image from The Global State Of Online Digital Trust

The Global State Of Online Digital Trust

The digital trust perception gap, and other findings in this ground-breaking study, highlight the need for business leaders to understand how much consumers trust organizations, what drives digital trust, and the business impact of losing that trust.

(more available)
Added: October 15, 2018
image from 6 Important Steps To Evaluating A Web Security Solution

6 Important Steps To Evaluating A Web Security Solution

Six Important Steps to Evaluating a Web Security Solution from EdgeWave®, offers IT professionals a checklist for evaluating Web security vendor solutions. The goal is to help you size up competitive offerings and understand new approaches to the critical problem of protecting your organization from mailcious web sites and inappropriate web use.

(more available)
Added: October 13, 2018
image from Businesses At Work

Businesses At Work

Businesses @ Work takes an in-depth look into how organizations and people work today—exploring employees, partners, contractors, and customers, and the apps and services they use to be productive.

(more available)
Added: October 13, 2018
image from Industry 4.0: The World Of Making Is Changing

Industry 4.0: The World Of Making Is Changing

This well designed Report provides excellent articles and insight into the growth of devices and Cyber Security.

Added: October 13, 2018
image from New Losses: Estimating the Global Cost of Cybercrime

New Losses: Estimating the Global Cost of Cybercrime

Covering a variety of regians, and industries, as well as types of cybercrime, this report gives a detailed analysis of the financial impact of cybercrime.

(more available)
Added: October 13, 2018
image from The Cost of Cyber Crime

The Cost of Cyber Crime

This research develops a causal model, relating different cyber crime types to their impact on the UK economy. The model provides a simple framework to assess each type of cyber crime for its various impacts on citizens, businesses and the Government.

(more available)
Added: October 13, 2018
image from Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

This Case Study looks at an example of how the app Pokemon Go, caused the compromise of sensitive corporate data.

(more available)
Added: October 12, 2018
image from Turning DDoS From A Cost Center To A Revenue Generator

Turning DDoS From A Cost Center To A Revenue Generator

Based on a survey conducted in 2017, this e-Book offers a unique perspective on the cost effectiveness of DDoS security.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 20:08 UTC (build b1d7be4)