Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Emerging Tech

Below you will find reports with the tag of “Emerging Tech”

image from Data Privacy: How Boards Can Safeguard Digital Assets Today For Success Tomorrow

Data Privacy: How Boards Can Safeguard Digital Assets Today For Success Tomorrow

In this Cyber Security series, Amrop collaborates with some of the industry’s most innovative companies as they trailblaze through the digital landscape. This first insight piece is co-authored with Jason du Preez, CEO of Privitar, a leader in the development and adoption of privacy engineering technology.

(more available)
Added: October 26, 2018
image from Healthcare Breach Report 2018

Healthcare Breach Report 2018

Bitglass’ fourth-annual Healthcare Breach Report analyzes data from the US Department of Health and Human Services’ “Wall of Shame,” where organizations that store or handle PHI are required to disclose breaches that affect at least 500 individuals. Read on to learn more about the breaches that caused the most damage in 2017 and to look at the year ahead in data security.

(more available)
Added: October 26, 2018
image from Rethinking Data Security With A Risk Adaptive Approach

Rethinking Data Security With A Risk Adaptive Approach

This report discusses the idea that there needs to be a paradigm shift in the approach to cybersecurity. It posits that the shift should occur by studing human behavior and interaction with data.

(more available)
Added: October 26, 2018
image from Trends In Security Framework Adoption

Trends In Security Framework Adoption

This report, is based on a survey of 338 IT and security professionals in the US. The goal of the survey was to quantify adoptions of security frameworks.

(more available)
Added: October 26, 2018
image from 2017: Security Operations Challenges, Priorities, and Strategies

2017: Security Operations Challenges, Priorities, and Strategies

This report concludes that, security operations is fraught with people, process, and technology challenges, that improvement is a high priority, organizations are embracing security orchestration, and orchestration is becoming a centralized platform.

(more available)
Added: October 25, 2018
image from Rethink The Role Of The CMO

Rethink The Role Of The CMO

In February 2018, Accenture Interactive commissioned Forrester Consulting to evaluate the current and future role of the CMO in building and delivering experiences and the need for organizationwide collaboration. In July 2018, Forrester conducted 10 interviews and an online survey with 250 senior-level marketing decision makers from a range of industries to explore this topic.

(more available)
Added: October 25, 2018
image from CIO Survey 2018: The Transformational CIO

CIO Survey 2018: The Transformational CIO

In last year’s survey, Harvey Nash and KPMG reported how CIOs were holding a steady line in the face of global uncertainty, cutting costs and refining business processes. Whilst much of this geopolitical instability remains, this year’s report shows how CIOs are benefiting from bigger budgets and headcount growth. Indeed, more IT leaders are enjoying budget increases than we have seen in the last thirteen years of reporting.

(more available)
Added: October 24, 2018
image from Cybersecurity The Innovation Accelerator

Cybersecurity The Innovation Accelerator

This report takes a look at how strong cyber security and business decision-making inspire growth and innovation.

Added: October 24, 2018
image from Insuring The Future: 2018 State Of Cyber Resilience For Insurance

Insuring The Future: 2018 State Of Cyber Resilience For Insurance

“Across all technologies and capabilities examined in the survey, about 80 percent or more of insurance executives are “confident” or “extremely confident” about their effectiveness. That might seem reasonable given the progress, but a case can be made that leadership is overconfident. Attackers are becoming increasingly sophisticated and attacks can shut down the business or expose customer data. If about one in five attempted breaches is successful, that’s still a lot of breaches. And, given the findings that 45 percent of breaches are not detected for more than a week (9 percent require more than a month), that’s a lot of risk exposure.”

(more available)
Added: October 24, 2018
image from Revitalizing Privacy And Trust In A Data-Driven World

Revitalizing Privacy And Trust In A Data-Driven World

From the report, “Massive data breaches and the constant collection of personal information routinely spur debate on whether privacy, rooted in ancient times, is dead in teh digiatl age. Are we in a post-privacy world? In many ways, it is the wrong question. Privacy, security and trust-all increasingly at risk-are also more vital and intertwined in our data-driven society.

(more available)
Added: October 24, 2018
image from The Continuum Of Cloud Native Topologies

The Continuum Of Cloud Native Topologies

This report gives a clever way to understand Cloud security topologies. It breaks all of the concepts down into a simple continuum.

(more available)
Added: October 24, 2018
image from The Internet Of Things Requires A Security Rethink

The Internet Of Things Requires A Security Rethink

This paper takes a good look at the new era that is being ushered in by the Internet Of Things. It discusses the “perfect storm” that is being created by the issues and innovations ahead.

(more available)
Added: October 24, 2018
image from The State Of Application Survey 2018

The State Of Application Survey 2018

Before slowing down development and causing customers to revolt, security and risk pros should read this report to understand the current state of application security and how emerging techniques support the speed your business needs.

(more available)
Added: October 24, 2018
image from Using cyber analytics to help you get on top of cybercrime: Third-generation Security Operations Centers

Using cyber analytics to help you get on top of cybercrime: Third-generation Security Operations Centers

As the threatscape continues to evolve rapidly in both sophistication and scale, the need to protect organizations’ intellectual property, operations, brand and shareholder value, in addition to their customers’ data, is ever more critical. But how do organizations build controls for the security risks they don’t even know about yet?

(more available)
Added: October 24, 2018
image from 6 Principles For DevOps Security At Scale

6 Principles For DevOps Security At Scale

DevOps and security leaders recognize that DevOps requires a fresh approach to security that mitigates risk and uncertainty without impairing velocity. This e-book presents six guiding principles for enabling DevOps security at scale.

(more available)
Added: October 23, 2018
image from A Framework For Exploring Cybersecurity Policy Options

A Framework For Exploring Cybersecurity Policy Options

The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other.

(more available)
Added: October 23, 2018
image from Cloud Hard 2018 Security With A Vengeance

Cloud Hard 2018 Security With A Vengeance

In partnership with the Information Security Community, Bitglass surveyed over 570 cybersecurity and IT professionals to learn how organizations are approaching cloud security. Read on to learn about the state of traditional tools, security measures IT leaders are taking, and cloud priorities for 2018.

(more available)
Added: October 23, 2018
image from Crossing The Last Mile Of IoT Security Cyber Risk

Crossing The Last Mile Of IoT Security Cyber Risk

This paper seeks to provide understanding and aid with meeting the unique information demands that the Internet of Things requires.

(more available)
Added: October 23, 2018
image from Cyber Threat Landscape: The Aviation Industry

Cyber Threat Landscape: The Aviation Industry

This paper focusses completely on cybersecurity issues in the aviation industry.

Added: October 23, 2018
image from Exploring Strategic Risk

Exploring Strategic Risk

This paper discusses the strategic risks facing coroporations today.

Added: October 23, 2018
image from Ironclad API's:An Approach For Application Security Testing

Ironclad API's:An Approach For Application Security Testing

This paper discusses some API’s and how you can protect them from an attack.

Added: October 23, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)