Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Emerging Tech

Below you will find reports with the tag of “Emerging Tech”

image from The Weaponization Of Information: The Need For Cognitive Security

The Weaponization Of Information: The Need For Cognitive Security

This paper presents the Testimony of Rand Waltzman presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017.

(more available)
Added: October 19, 2018
image from World Economic Situations And Prospects: Update as of mid-2018

World Economic Situations And Prospects: Update as of mid-2018

The present document updates World Economic Situation and Prospects 2018 (United Nations publication, Sales No. E.18.II.C.2), released in December 2017.

(more available)
Added: October 19, 2018
image from 2016 Annual Corporate Directors Survey

2016 Annual Corporate Directors Survey

This report details the changes that have taken place in Board governance. It discusses the impact these changes have on security and risk issues in business.

(more available)
Added: October 18, 2018
image from 2017 Open Source Security & Risk Analysis

2017 Open Source Security & Risk Analysis

This report includes insights and recommendations intended to help organi- zations and their security, risk, legal, and development teams better understand the open source security and license risk landscape as they strive to improve their application risk management processes.

(more available)
Added: October 18, 2018
image from Bridging The IoT Perception Gap:Information Vs. Operational Technology

Bridging The IoT Perception Gap:Information Vs. Operational Technology

This report is based on a survey that was conducted to observe the differing views and opinions of IT and OT teams.

(more available)
Added: October 18, 2018
image from Build Vs. Buy: Evaluating Identity Management

Build Vs. Buy: Evaluating Identity Management

Every corporation struggles with the decision to Build or Buy an identity management platform. This report seeks to offer advice to aid in that decision.

(more available)
Added: October 18, 2018
image from Generations of Machine Learning In Cybersecurity

Generations of Machine Learning In Cybersecurity

In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. In addition, the paper seeks to explain that while a great deal of progress has been made in the evolution of machine learning’s application to cybersecurity challenges, there remains an immense amount of opportunity for innovation and advancement in the field, and they expect the sophistication of applications of machine learning to continue to evolve over time.

(more available)
Added: October 18, 2018
image from Global Risks 2015

Global Risks 2015

From the preface to the report, “As in previous years, the Report is based on the annual Global Risks Perception Survey, completed by almost 750 members of the World Economic Forum’s global multistakeholder community. In addition to the special section exploring the evolving security landscape in an era of uncertainty, the Report presents deep-dive discussions of risks to the stability of societies posed by the (dis)empowered citizen, who is empowered by technology but feels disempowered by traditional decision-making processes. It also discusses the societal consequences of climate change with a focus on food and water crises and the threat of global pandemics.”

(more available)
Added: October 18, 2018
image from How To Mitigate Five IT Problems Affecting The Financial Industry

How To Mitigate Five IT Problems Affecting The Financial Industry

Read this whitepaper to see how you can mitigate the following five financial services industry IT challenges. Minimize breaches, reduce cyber theft, use technology to improve network performance, improve compliance, and leverage technology to provide a competitive advantage.

(more available)
Added: October 18, 2018
image from The Economic Impact of Cybercrime and Cyber Espionage

The Economic Impact of Cybercrime and Cyber Espionage

This report seeks to answer the following question, “Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,” or is it what others say is a “rounding error in a fourteen trillion dollar economy?””

(more available)
Added: October 18, 2018
image from Top Global Business Risks of 2016

Top Global Business Risks of 2016

The fifth annual Allianz Risk Barometer identifies the corporate perils for 2016 and beyond, based on the responses of more than 800 risk experts from 40+ countries around the globe.

(more available)
Added: October 18, 2018
image from 2018 State Of DevOps Report

2018 State Of DevOps Report

The 2018 State of DevOps Report breaks new ground in an understanding of the DevOps evolutionary journey. They have identified the five distinct stages of DevOps evolution, and the critical practices at each stage that help you achieve success and progress to the next phase of your journey.

(more available)
Added: October 17, 2018
image from CISO Tips: Speaking the language of business

CISO Tips: Speaking the language of business

What’s not open to discussion is that the role of information security executives has evolved. CISOs may now find themselves talking to investors about how an attack impacted quarterly earnings in addition to more traditional duties like managing a SOC.

(more available)
Added: October 17, 2018
image from Cyber Security in the Boardroom

Cyber Security in the Boardroom

The, NYSE Governance Services, in partnership with Veracode, surveyed nearly 200 directors of public companies representing a variety of industries—including financial services, technology, and health care—to discover how they view cybersecurity in the boardroom. Their goal was to gain insight into how cybersecurity is being understood, prioritized, and addressed at the board level.

(more available)
Added: October 17, 2018
image from Enterprise Guide To iOS App Development

Enterprise Guide To iOS App Development

This paper provides a helpful guide to iOS App development for the enterprise.

Added: October 17, 2018
image from Exploring Cyber Security Policy Options In Australia

Exploring Cyber Security Policy Options In Australia

In December 2016, RAND and the National Security College at The Australian National University partnered to facilitate a cyber security–focused 360o Discovery Exercise in Canberra. The exercise used plausible scenarios to explore the chal- lenges Australia faces in securing cyberspace by placing pres- sure on government authorities, industry capabilities, users’ tolerance for malicious cyber activity, and the ability to develop interdisciplinary solutions to pressing cyber security challenges. The scenarios considered the security of the Internet of Things and intellectual property theft against a backdrop of evolving international norms of behaviour in cyberspace.

(more available)
Added: October 17, 2018
image from State Of Cloud Security 2018

State Of Cloud Security 2018

This paper provides insights into some of the latest cloud practices and technologies enterprise information security practitioners must be aware of as IT and sensitive data extends beyond the traditional corporate perimeter.

(more available)
Added: October 17, 2018
image from State Of Enterprise Resource Planning In Cloud Security

State Of Enterprise Resource Planning In Cloud Security

The main objective of the document is to provide a brief introduction to cloud ERP security. The targeted audience of this document includes IT and management professionals who oversee the business IT assets of their respective organizations.

(more available)
Added: October 17, 2018
image from The Case For Software Security

The Case For Software Security

This E-book discusses the importance of securing software.

Added: October 17, 2018
image from 2017 State of DevOps Report

2017 State of DevOps Report

This paper seeks to provide high level and tactical findings that are intended to help you advance the progress of your own DevOps Journey. Some key findings in this report are; the beneficial effects of DevOps go beyond financial results, automation is a key differentiator for organizations, and they delve deep into how an application’s architecture can affect an organization’s ability to develop and deliver software.

(more available)
Added: October 16, 2018
image from A Clearer View of Emerging Risks: Emerging Risks Report 2015

A Clearer View of Emerging Risks: Emerging Risks Report 2015

In this report, they examine four key areas where risks continue to emerge or, perhaps, more importantly, contain elements where the risks are unknown at this time: a) Cyber, b) Life, health and longevity, c) New Technologies, d)casualty catastrophe reserving.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 13
  • 14
  • 15
  • 16
  • 17
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)