Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Emerging Tech

Below you will find reports with the tag of “Emerging Tech”

image from Evolution Of Cloud In Education

Evolution Of Cloud In Education

Vector Consulting was commissioned by Cisco Australia and New Zealand to better understand the role and impact of cloud in higher education and training. For the purposes of this report `cloud’ is predominantly focused on infrastructure as a service or cloud-based infrastructure. The study included desktop research, targeted interviews and a comprehensive survey, which forms the basis for this report. The survey was distributed electronically to Australian and New Zealand institutions to better understand their current views about where cloud was having the most impact and how they were planning for cloud. The survey was in field for two weeks and all individual responses were provided.

(more available)
Added: October 14, 2018
image from Protecting The Crown Jewels In The Pivot To Digital Transformation

Protecting The Crown Jewels In The Pivot To Digital Transformation

This white paper by Onapsis and HMG Strategy will explore best practices for securing vital information contained in SAP and Oracle systems for those organizations that are shifting to a digital environment. In the pages that follow, discover the top security risks associated with mission-critical systems along with recommended approaches for mitigating those risks.

(more available)
Added: October 14, 2018
image from 2017 Security Pressures Report

2017 Security Pressures Report

For ease of consumption, this report is designed into individual sections of “pressures” each featuring insightful context and convenient data tables, with the results compared against last year’s findings as a way of understanding the state of security. In addition, we have broken out the results by country to include the United States, United Kingdom, Canada, Australia, Singapore – and for the first time – Japan. Like in years past, you will find some of the comparison data is particularly intriguing and revealing into the mindset of IT and security professionals based on their region.

(more available)
Added: October 13, 2018
image from Cyber Security Economic Issues

Cyber Security Economic Issues

The emerging field of cybersecurity economics could benefit from better data, better under- standing, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity invest- ment decisions. In particular, it suggests that companies, the government, and other organizations can help improve our under- standing of cybersecurity economics by moni- toring cybersecurity incidents and responses, soliciting and using standard terminology and measures, and sharing data whenever possible.

(more available)
Added: October 13, 2018
image from Game Plan for Closing the SecOPS Gap

Game Plan for Closing the SecOPS Gap

Forbes created a new survey. And, from that survey, a common theme emerged from the survey and the one-on-one interviews: today’s enterprises need a modern game plan that uses technology, people and processes to close the SecOps gap.

(more available)
Added: October 13, 2018
image from Getting Ready For The GDPR

Getting Ready For The GDPR

This whitepaper provides insight into getting ready for the GDPR.

Added: October 13, 2018
image from Industry 4.0: The World Of Making Is Changing

Industry 4.0: The World Of Making Is Changing

This well designed Report provides excellent articles and insight into the growth of devices and Cyber Security.

Added: October 13, 2018
image from Malware Review Q1 2017

Malware Review Q1 2017

Between the beginning of 2017 and close of its first quarter, PhishMe IntelligenceTM completed analysis of 749 sets of phishing emails delivering nearly ten thousand unique malware samples supported by over fourteen thousand online resources. These indicators of compromise, as well as a full assessment of the phishing email tactics and malware capabilities, were profiled in in reports and Strategic Analysis documents designed to highlight techniques being used across the threat landscape. Several trends defined the phishing threat landscape in the first quarter of 2017.

(more available)
Added: October 13, 2018
image from New Losses: Estimating the Global Cost of Cybercrime

New Losses: Estimating the Global Cost of Cybercrime

Covering a variety of regians, and industries, as well as types of cybercrime, this report gives a detailed analysis of the financial impact of cybercrime.

(more available)
Added: October 13, 2018
image from Spies In The Enterprise

Spies In The Enterprise

Bitglass reports on the results of their survey regarding how cybersecurity teams are mitigating various threats in the cloud.

Added: October 13, 2018
image from Spotlight On 2017

Spotlight On 2017

This edition of Spotlight features a selection of work carried out in 2017 by the Rand Corporation, to help meet new and evolving challenges. They have completed several studies that examine the implications of Brexit for the UK, the EU, and beyond. They have examined the potential of increasingly advanced technology, including in the areas of cybersecurity and digital transactions. And they have evaluated and recommended improvements to be made along the path to better systems in health, policing and education.

(more available)
Added: October 13, 2018
image from 2017 Security Predictions

2017 Security Predictions

This report seeks to prove that the world emerging in 2017 will challenge cybersecurity professionals like never before.

Added: October 12, 2018
image from Cloud Security Trends: May 2017

Cloud Security Trends: May 2017

This is a report on cloud security trends.

Added: October 12, 2018
image from Cybersecurity Challenges in Aviation

Cybersecurity Challenges in Aviation

This paper discusses the issues and challenges involved in maintaining good cybersecurity in the field of aviation.

Added: October 12, 2018
image from Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

Cybersecurity Insights Volume 5: The CEO's Guide To Data Security

In this report the authors provide insight into the importance of data security.

Added: October 12, 2018
image from Enterprises Re-engineer Security in the Age of Digital Transformation

Enterprises Re-engineer Security in the Age of Digital Transformation

In this report, they highlight key findings from a recent survey of more than 200 CIO’s and CISO’s, and outline how executives are actively revising security models to create a culture of cybersecurity and safeguard their organizations in today’s continually changing business environment.

(more available)
Added: October 12, 2018
image from GDPR Headlines

GDPR Headlines

Centrify has worked with the specialist law firm, Cordery, to develop this headline summary of when the GDPR applies, the key impacts and what you need to do to comply with the GDPR.

(more available)
Added: October 12, 2018
image from Key Findings from The Global State of Information Security Survey 2016

Key Findings from The Global State of Information Security Survey 2016

This report is discussing the rising trend of organizations properly prioritizing the risks and dangers of cyber threats.

Added: October 12, 2018
image from Report Malware PI

Report Malware PI

This report takes a look at Malware in the cloud and offers some solutions to the problem.

Added: October 12, 2018
image from Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

This RAND Perspective suggests that technological develop- ments and social dynamics are working in tandem to shift society into hyperdrive, which can usher in unprecedented security concerns. Despite the potential for increased speed as 2040 nears, the authors assert that this phase of acceleration is neither uniform nor determin- istic. Without knowing the future, we can still have the foresight to prepare for security in an age of increasing speed and find value in having collaborative discussions about the role of speed as a catalyst within future global risk and security.

(more available)
Added: October 12, 2018
image from State Of The Global Technology Economy

State Of The Global Technology Economy

In this report, they examine research on the global growth of technology spend and spending patterns behind the highest performing companies. They also share best practices used by top performers to maximize the business value of their spend.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)