Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from 2021 Threat Hunting Report

2021 Threat Hunting Report

The 2021 Threat Hunting Report explores the challenges, technology preferences, and benefits of threat hunting to gain deeper insights into the maturity and evolution of the security practice. Threat hunting continues to evolve as an innovative cybersecurity tactic that focues on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by tradition, reactive security technologies.

(more available)
Added: October 24, 2022
image from Application Protection Report 2022

Application Protection Report 2022

The goal of this report is to document the evolution of the threat landscape over the previous years so security practitioners can tune their defenses to suit. More specifically, this report is intended to clarify the relationship between target characteristics and attacker behavior so that each organization can focus on the threats most applicable to them.

(more available)
Added: October 21, 2022
image from 2021 AWS Cloud Security Report

2021 AWS Cloud Security Report

The 2021 AWS Cloud Security Report is to uncover how AWS user organizations are responding to new security threats in the cloud, and what tools and best practices cybersecurity leaders are prioritizing in their move to the cloud. This year’s survey saw some significant changes in how organizations manage remediation of security and compliance issues with system owners.

(more available)
Added: October 18, 2022
image from 2021 Insider Landscape Report

2021 Insider Landscape Report

The 2021 Insider Landscape Report reveals the latest trends and challenges facing organizations in this new environment. The report explores how IT and cybersecurity professionals deal with risky insiders and how organizations are preparing to better protect their critical data and IT infrastructure.

(more available)
Added: October 18, 2022
image from 2021 Identity and Access Management Report

2021 Identity and Access Management Report

The 2021 Identity and Access Management Report reveals the increasing importance of managing access as part of an organization’s overall risk management and security posture in the new normal of hybrid work locations. The report highlights what is and what is not working for security operations teams in securing access to sensitive data, systems, and applications.

(more available)
Added: October 18, 2022
image from 2021 Zero Trust Progress Report

2021 Zero Trust Progress Report

The 2021 zero trust report reveals how enterprises are implementing zero trust security in their organizations, including key drivers, adaption trends, technologies, investments, and benefits. To provide this information, we surveyed cybersecurity professionals ranging from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 18, 2022
image from Managed Security Report 2022

Managed Security Report 2022

The 2022 Managed Security Report reveals the latest trends and attitudes toward managed security, answering why organizations invest in security outsourcing, what challenges they are facing, and what requirements companies are prioritizing. This report is based on the results of a comprehensive online survey of IT and cybersecurity professionals conducted in 2022.

(more available)
Added: October 18, 2022
image from Enterprise Perspectives 2022

Enterprise Perspectives 2022

This research was conducted to understand the challenges, concerns, and perspectives of large enterprise organizations as they continue adapting their IT strategy and infrastructure to the rigors and risks of digital transformation and the hybrid work environment. It explores the investments organizations have already made to bolster infrastructure and security and those they are planning to make. It also examines expectations for remote and hybrid work as we enter a new phase of living with COVID-19.

(more available)
Added: October 17, 2022
image from 2022 Endpoint Security Report

2022 Endpoint Security Report

The 2022 Endpoint Security Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing.

(more available)
Added: October 14, 2022
image from 2022 Application Security Report

2022 Application Security Report

This report is based on the results of a comprehensive online global survey of 386 cybersecurity professionals, conducted in July 2022, to gain deep insight into the latest trends, key challenges, and solutions for application security. The respondents range from technical executives to managers and IT security practitioners, representing a balancing cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 12, 2022
image from Reining in Ransomware

Reining in Ransomware

In this report, we’ve analyzed on-the-ground evidence collected while responding to nearly 1,500 ransomware events exceeding $1 billion in ransom demands. Through it all, we’ve helped our clients manage their response, minimize costs, and maintain business operations. And we hope this report helps many other organizations and insurers do the same.

(more available)
Added: October 11, 2022
image from Cost of a Data Breach Report 2022

Cost of a Data Breach Report 2022

This report offers IT, risk management and security leaders a lens into factors that can increase or help mitigate the rising cost of data breaches. This report also examines root causes, short-term and long-term consequences of data breaches, and the mitigating factors and technologies that allow companies to limit losses.

(more available)
Added: October 10, 2022
image from Information Risk Insights Study

Information Risk Insights Study

This study leverages a vast dataset spanning over 77,000 cyber events experienced by 35,000 organizations over the last decade. This dataset is drawn from Advisen’s Cyber Loss Data, which contains over 138,000 cyber events collected from publicly verifiable sources.

(more available)
Added: October 7, 2022
image from You Think Ransomware Is Your Only Problem? Think Again

You Think Ransomware Is Your Only Problem? Think Again

Organizational leaders of all types understand that ransomware can cause extreme damage to the organization’s ability function and, in some cases, even survive. Ransomware is not just an IT issue but a situation involving the highest levels of management, including the CEO. Ransomware attacks can be so significant that they trigger a disaster response using traditional disaster recovery (DR) tools and methods.

(more available)
Added: October 4, 2022
image from 2022 US Cybersecurity Census Report

2022 US Cybersecurity Census Report

This report, Keeper’s second annual U.S. Cybersecurity Census, maps the transforming landscape of cybersecurity based on these expert insights. It provides leaders with a forensic assessment of the threats their businesses face, and details the urgent strategies necessary to overcome them.

(more available)
Added: September 29, 2022
image from VPN Risk Report 2021

VPN Risk Report 2021

The 2021 VPN Risk Report surveyed 357 cybersecurity professionals, providing insight into the current remote access environment, the state of VPN within the enterprise, the rise in VPN vulnerabilities, and the role that zero trust will play in enabling access to apps going forward.

(more available)
Added: September 29, 2022
image from The State of Encrypted Attacks

The State of Encrypted Attacks

The Zscaler Zero Trust Exchange houses the largest security data set in the world, collected from over 300 trillion signals and 160 billion daily transactions - more than 15x the volume of Google searches each day. Zscaler’s ThreatLabz threat research team analyzed this data from the last nine months of 2021, assessing threats in encrypted traffic over the span.

(more available)
Added: September 27, 2022
image from VPN Risk Report

VPN Risk Report

This report is based on the results of a comprehensive online survey of 351 IT and cybersecurity professionals, conducted in June 2022 to identify the latest enterprise adoption trends, challenges, gaps, and solution preferences related to VPN risk. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: September 26, 2022
image from Quantifying the Public Vulnerability Market: 2022 Edition

Quantifying the Public Vulnerability Market: 2022 Edition

Omdia conducted a comprehensive comparative analysis of the output of 11 organizations that disclose information security vulnerabilities. The data collected for this report stems from multiple courses, including the following: primary internal research, individual vendor interviews, open course publications and publicly disclosed reports.

(more available)
Added: September 22, 2022
image from The State of Cloud Security Report 2022

The State of Cloud Security Report 2022

For this report, Snyk surveyed more than 400 cloud engineering and security professionals to better understand the cloud risks and challenges they face, and how they’re successfully improving their cloud security efforts.

(more available)
Added: September 15, 2022
image from SANS 2022 Cyber Threat Intelligence Survey

SANS 2022 Cyber Threat Intelligence Survey

The SANS CTI survey shows that many CTI programs can meet the challenge. While some programs are just getting started due to increased cybersecurity needs and a growing, complex threat environment brought on by the rapid shift to remote work, organizations can rely on CTI providers and information-sharing groups to fill in the gaps as their programs mature.

(more available)
Added: September 15, 2022
  • ««
  • «
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 00:08 UTC (build b1d7be4)