Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Emerging Tech

Below you will find reports with the tag of “Emerging Tech”

image from The 5 Stages of DevOps Evolution: A Guide For CIOs

The 5 Stages of DevOps Evolution: A Guide For CIOs

From the report, “This year we designed our DevOps survey to reveal what successful organizations actually do as they progress on their DevOps journeys. We discovered that they experience five distinct stages of DevOps evolution, which we have shared in full detail in our 2018 State of DevOps Report. This CIO guide digests our research into a report that’s just for you. We want to help you quickly understand what successful organizations do at each stage of DevOps evolution; which practices must be established at each stage (we call these the defining practices); and how you can best support your team throughout its DevOps journey to assure continuing progress and success.”

(more available)
Added: January 24, 2019
image from Securing The Digital Economy: Reinventing The Internet For Trust

Securing The Digital Economy: Reinventing The Internet For Trust

From the report, “Without trust, the future of our digital economy and its nearly limitless potential is in peril. Piecemeal efforts to address cybersecurity issues—including the Internet’s inherent flaws, vulnerabilities from the Internet of Things (IoT), identity and data veracity and increasing digital fragmentation—have fallen short. Through their decisions above ground on industry-wide governance and their business architecture and technology infrastructure below ground, however, CEOs can have the influence necessary to collaboratively address these overarching issues.”

(more available)
Added: January 24, 2019
image from State of Application Services 2019 Report

State of Application Services 2019 Report

From the report, “For our fifth annual survey, we asked nearly 2,000 respondents globally across a range of industries, company sizes, and roles—about the challenges and opportunities presented by the ongoing process of digital transformation. This survey provides a uniquely comprehensive analysis of the trends shaping the application landscape—and how IT organizations are transforming to meet the ever-changing demands of the digital economy.”

(more available)
Added: January 17, 2019
image from Global DNS Defense Report Q1/2018

Global DNS Defense Report Q1/2018

In this new research, Farsight Security selected the primary domain for nearly 4000 organizations, including leading global corporations and higher education institutions. We then tested those domains using key DNS indicators to assess adoption of emerging technologies and risk exposure.

(more available)
Added: January 16, 2019
image from The State of AI in Cybersecurity: The Benefits, Limitations and Evolving Questions

The State of AI in Cybersecurity: The Benefits, Limitations and Evolving Questions

Osterman Research conducted an in-depth survey of decision makers and influencers. To qualify for the survey, individuals had to be knowledgeable about the security operations in their organizations and their organizations had to have at least 1,000 employees. A total of 404 surveys were conducted during June and July 2018. This white paper discusses the results of that research and our analysis of the survey data.

(more available)
Added: January 15, 2019
image from Facing Forward: Cyber Security in 2019 and Beyond

Facing Forward: Cyber Security in 2019 and Beyond

From the report, “In the cyber security industry, we’re so frequently working around-the-clock for days at a time that we often forget when one year ends and another begins. It’s a shame, too, because the end of the year is a very important time. It provides a moment to reflect on what we observed and experienced over the past 12 months, and to consider how best to address the challenges we have been facing. Perhaps more critical to our line of work, it offers an opportunity to note what developed into a trend, and what might develop into a trend as we move into the next year and beyond.”

(more available)
Added: January 15, 2019
image from The Impact Of Cloud On ERP

The Impact Of Cloud On ERP

The “Impact of Cloud on ERP” survey report was designed to assess the impact of ERP solutions on organizations and better understand cloud preparation and data migration needs to implement ERP solutions in the cloud. Features and benefits gained, security and privacy challenges, and time to deploy for an ERP Solution in a cloud environment were explored.

(more available)
Added: January 15, 2019
image from Cybersecurity Insights Volume 8: Charting A New Course

Cybersecurity Insights Volume 8: Charting A New Course

In the summer of 2018, AT&T Business and Spiceworks performed a research study with 250 IT leaders. The research revealed that 99% of organizations have a security risk management strategy. However, there is a sharp performance divide between the organizations confident in their risk management strategies (42% called the “Confident Investors”) and organizations who are not (57% called the “Unconfident Investors”).

(more available)
Added: January 15, 2019
image from 2018 State Of The Software Supply Chain

2018 State Of The Software Supply Chain

Sonatype’s 4th annual report on managing open source components to accelerate innovation.

Added: January 15, 2019
image from 2017 State Of The Software Supply Chain

2017 State Of The Software Supply Chain

This 2017 report has similarities to previous years, but there are three differences worth noting. First, the analysis in this year’s report extends beyond Java and includes supply chain findings for JavaScript, NuGet, Python, and Docker. Second, this year’s paper includes a stronger emphasis on the emergence of DevOps and reflects on the evolution of modern IT organizations as they seek to transform from waterfall-native to DevOps-native software development. Lastly, this year’s research delves deeper into the rapidly evolving role of regulation, legislation, and litigation with respect to open source governance and software supply chain management.

(more available)
Added: January 15, 2019
image from Seizing Control OF Software Supply Chain Security

Seizing Control OF Software Supply Chain Security

This paper presents the results of a survey that sought to understand how IT decision makers are thinking about the term “software supply chain attacks.”

(more available)
Added: January 1, 2019
image from Modern Bank Heists: Cyberattacks & Lateral Movement in the Financial Sector

Modern Bank Heists: Cyberattacks & Lateral Movement in the Financial Sector

In this survey of 40 CISO’s from major financial institutions, revealed trends in lateral movement, counter incident response, integrity attacks and the most concerning threat actors organizations face.

(more available)
Added: January 1, 2019
image from Missing Critical Patches: A Cybersecurity Epidemic

Missing Critical Patches: A Cybersecurity Epidemic

From the report, “IT security leaders know their companies’ endpoints, PCs, and servers are continuously targeted by hackers. They also agree following best practices in endpoint security hygiene is instrumental in reducing cyber incidents. However, our 2017 survey of IT security leaders points to a situation where most are concerned about their actual practices in endpoint security hygiene. Fortunately, most also acknowledge they need to improve. When it comes to identifying their top priorities, IT security leaders are clear: they want to reduce the frequency and severity of data breaches; streamline regulatory compliance; and maintain business continuity. When it comes to identifying and executing upon the security hygiene best practices required to deliver on these priorities, things begin to get murky. Our 2017 survey of IT security leaders reveals a situation in which most respondents express concern about their security hygiene practices and waning confidence in the ability of existing tools to help them improve. Read on for more about what we learned, plus five recommended action items you can take today to address these issues.”

(more available)
Added: December 29, 2018
image from Exclusive Report: WannaCry One Year On

Exclusive Report: WannaCry One Year On

This report draws conclusions from the data to understand why organizations are struggling to take actions from lessons learned from a year of the WannaCry virus.

(more available)
Added: December 29, 2018
image from Reinventing Cybersecurity Prevention With Deep Learning

Reinventing Cybersecurity Prevention With Deep Learning

In this whitepaper they cover the different defense technologies used over time, how different attacks vectors influenced this evolution, how the industry adopted different approaches over time, and why the prevention approach has returned and why it matters.

(more available)
Added: December 29, 2018
image from European Technology Index 2018: Is The Era Of The Technology Wild West Over?

European Technology Index 2018: Is The Era Of The Technology Wild West Over?

This is DLA Piper’s fourth Tech Index study into the perceptions and attitudes of European technology growth. As ever, we review how attitudes are changing with regard to market developments, shifts in the financial regulatory landscape and government policies designed to spur business innovation in an increasingly uncertain and disruptive world.

(more available)
Added: December 14, 2018
image from The ISACA/CMMI Institute Cybersecurity Culture Report: Narrowing The Culture Gap For Better Business Results

The ISACA/CMMI Institute Cybersecurity Culture Report: Narrowing The Culture Gap For Better Business Results

This paper aims to provide help in understanding how to better the cybersecurity culture in an organization.

Added: December 4, 2018
image from International Anti-Botnet Guide 2018

International Anti-Botnet Guide 2018

From the report, “While the developers of this Guide strongly support the important role that governments play in convening a diverse ecosystem, the imposition of prescriptive, compliance-focused regulatory requirements will inhibit the security innovation that is key to staying ahead of today’s sophisticated threats. Moreover, earlier policy efforts were based on utopian solutions to these threats, premised on the notions that internet service providers (ISPs) can simply shut down all botnets, or that manufacturers can make all devices universally secure. Instead, dynamic, flexible solutions that are informed by voluntary consensus standards, driven by market demands, and implemented by stakeholders throughout the global digital economy, are the better answer to these evolving systemic challenges.”

(more available)
Added: December 4, 2018
image from The State Of Cloud And Data Protection 2018

The State Of Cloud And Data Protection 2018

This report provides 10 findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption.

Added: November 30, 2018
image from The Pulse Report 2018

The Pulse Report 2018

This report provides an international study of senior management attitudes to leadership development and executive education. It also provides insight into cybersecurity related issues.

(more available)
Added: November 28, 2018
image from Corporate Learning Pulse

Corporate Learning Pulse

This report offers a unique insight into the C-Suite. It pays particular attention to their views on Cybersecurity.

Added: November 28, 2018
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)