Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Emerging tech

Below you will find reports with the tag of “Emerging tech”

image from 2021 State of the Software Supply Chain

2021 State of the Software Supply Chain

Now in its seventh year, Sonatype’s 2021 State of the Software Supply Chain Report blends a broad set of public and proprietary data to reveal important findings about open source and its increasingly important role in digital innovation. (more available)
Added: May 19, 2022
image from Flexera 2022 State of ITAM Report

Flexera 2022 State of ITAM Report

The report evaluates the responses of 465 global IT professionals who manage, advise, and participate in ITAM, SAM, and HAM activities in organizations of 1,000 or more employees. (more available)
Added: February 11, 2022
image from Understanding XDR Requirements: What XDR Is and Why Organizations Need It

Understanding XDR Requirements: What XDR Is and Why Organizations Need It

CISOs aren’t alone in recognizing the need for new threat detection and response strategies. In fact, security technology providers are championing a new technology initiative dubbed eXtended Detection and Response (XDR). (more available)
Added: January 24, 2022
image from Public Power Cybersecurity Scorecard 2019 Annual Report

Public Power Cybersecurity Scorecard 2019 Annual Report

This report creates an overall picture of the cybersecurity capabilities of public power utilities. Moreover, it supports the previous year’s findings and provides a consistent approach for supporting DOE’s Multiyear Plan for Energy Sector Cybersecurity. (more available)
Added: January 14, 2022
image from Executive Perspectives on Top Risks for 2021 & 2030

Executive Perspectives on Top Risks for 2021 & 2030

This report is based on an annual survey of boards of directors and C-suite executives about risks on the horizon for the upcoming year. (more available)
Added: January 7, 2022
image from The state of cybersecurity resilience 2021

The state of cybersecurity resilience 2021

More than 4,700 executives were surveyed in March and April of 2021 in order to understand the extent to which organizations prioritize security, how comprehensive their security plans are, and how their security investments are performing. (more available)
Added: January 7, 2022
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. (more available)
Added: December 10, 2021
image from Netscout Threat Intelligence Report: 1H 2021

Netscout Threat Intelligence Report: 1H 2021

The regular update to this threat intelligence series. Focuses on changes in attacker behaviors in the first half of 2021, with particular focus on DDOS activity, ransomware actions, supply chain attacks, and COVID-19 related patterns. (more available)
Added: September 23, 2021
image from Securing a Shifting Landscape: Corporate perceptions of nation-state cyber-threats

Securing a Shifting Landscape: Corporate perceptions of nation-state cyber-threats

This report assesses corporate perceptions of nation-state cyber-threats. It finds that companies have become more aware of the challenges posed by such threats and are concerned about them; however, their ability to respond to evolving risks may be lacking. (more available)
Added: February 24, 2021
image from Cybersecurity Professionals Stand Up to a Pandemic

Cybersecurity Professionals Stand Up to a Pandemic

This report aims to capture the mood and environment of the cybersecurity workforce in the midst of the COVID-19 pandemic. It reveals the impact COVID-19 has had on cybersecurity professionals and teams and the challenges many of them have had to overcome. (more available)
Added: January 29, 2021
image from Cyber Security Team's Guide to Technology Decision Making

Cyber Security Team's Guide to Technology Decision Making

This report was created after a survey of more than 900 Senior IT security decision-makers. It looks at how they allocate finite resources in a way that best serves their organization. (more available)
Added: December 18, 2020
image from State of Third-Party Risk Management 2020

State of Third-Party Risk Management 2020

A survey-driven report of over 150 third-party risk practitioners to understand the challenges facing their programs, the actions those professionals are taking to address the challenges, and identify success factors. (more available)
Added: November 5, 2020
image from 2020 Year in Review: ENISA Threat Landscape

2020 Year in Review: ENISA Threat Landscape

This is the 8th annual Year in Review Report. It looks at cyber threat intelligence, sectoral and thematic threats, emerging trends, and the biggest incidents worldwide from the past year. (more available)
Added: November 1, 2020
image from Company-Issued Computers: What Are Employees Really Doing With Them?

Company-Issued Computers: What Are Employees Really Doing With Them?

This report comes from a survey of more than 1,000 businesspeople around the world that have a company-issued computing device. It looks into what people are using their work computers for, and how that can leave them vulnerable to cyber threats. (more available)
Added: October 29, 2020
image from State of Software Security: Volume 11

State of Software Security: Volume 11

The 2020 edition of this annual report uses results of software scan patterns and results across thousands of global customers. A focus for this edition is the effects of nature (the corporate environment of applications) vs. (more available)
Added: October 27, 2020
image from 2020 Global Financial Crime Investigations Survey Report

2020 Global Financial Crime Investigations Survey Report

This report is based on a survey of investigators from over 150 organizations. It seeks to better understand financial crime and how companies deal with it. (more available)
Added: October 25, 2020
image from 2020 Deloitte-NASCIO Cybersecurity Study

2020 Deloitte-NASCIO Cybersecurity Study

This report reflects insights from 51 state and territory respondents on the CISO’s role, as well as budget, governance, reporting, workforce, and operations. (more available)
Added: October 18, 2020
image from Cybersecurity Team's Guide: Technology Decision Making

Cybersecurity Team's Guide: Technology Decision Making

This report is based off an August 2020 survey, in order to better understand how companies should allocate finite resources, how decisions on cybersecurity are made, and more. (more available)
Added: October 14, 2020
image from 2020 State of SaaSOps

2020 State of SaaSOps

This report gives insight on how modern IT organizations deal with the challenges of managing Saas at scale.
Added: October 11, 2020
image from 2020 SMB IT Security Report

2020 SMB IT Security Report

This report focuses on cybersecurity for small and medium sized businesses for 2020. It goes over how cyber attacks have changed, how remote work has an effect, and more. (more available)
Added: October 7, 2020
image from ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

ECSO Barometer 2020: "Cybersecurity In Light of COVID-19"

This is a report on a survey conducted by the ECSO from March 2020 to May 2020, with members of the cybersecurity community. (more available)
Added: September 28, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 14
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 27, 2022 12:09 UTC (build d6199b1)