Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Emerging Tech

Below you will find reports with the tag of “Emerging Tech”

image from LevelBlue Futures  Report 2024

LevelBlue Futures Report 2024

With the advent and spread of powerful new technologies, businesses are under more pressure than ever to secure their organizations from the start of new computing developments. This report closely examines what executives are doing to protect their organizations and reveals what worries them about the tradeoffs between fostering innovation and lowering risk.

(more available)
Added: June 12, 2024
image from How defenders can address targeted attacks with new honeypot techniques.

How defenders can address targeted attacks with new honeypot techniques.

In the second quarter of 2023 GreyNoise researchers observed a substantial change in the behavior of some regular internet scanning idioms. Inventory scans—where both benign and malicious actors perform regular checks for a given technology or specific vulnerability being present—significantly reduced in frequency and scale. These targeted attacks threaten to circumvent existing defense capabilities and expose organizations to a new wave of disruptive breaches. Defenders must evolve in response.

(more available)
Added: June 4, 2024
image from IT and Security Convergence Report 2024

IT and Security Convergence Report 2024

The target population was reached through in-person events, and by third parties via their opt-in email lists, Genetec opt-in email lists, and by digital promotions. This report points out whether answers are from all respondents, end user respondents, or channel partner respondents.

(more available)
Added: May 31, 2024
image from 2024 Secure Cloud Networking Field Report

2024 Secure Cloud Networking Field Report

This survey conducted by Aviatrix explores the trends impacting global cloud, networking, and security practitioners, and how they’re impacting the bottom line for enterprises worldwide. This report will look more closely at the causes and impacts of these findings, as well as recommendations for improving enterprise and industry outcomes in the future.

(more available)
Added: April 22, 2024
image from 2024 Data Threat Report

2024 Data Threat Report

The 2024 Data Threat Report (DTR) analyzes how core security practices have changed in response to or in anticipation of changing threats. This report also offers perspectives on what organizations can do to leverage data assets to expand opportunities to make their businesses more agile and build trust with their customers. This report also considers both securing the use of GenAI and using GenAI to better secure the enterprise. Differing priorities from different functional leaders and external stakeholders will require security and risk management leaders to build stronger relationships.

(more available)
Added: April 16, 2024
image from The State of Security Observation 2023

The State of Security Observation 2023

Security Observability is a technique of using logs, metrics, and traces to infer risk, monitor threats, and alert on breaches. It is a critical technique for security professionals to embrace. Security professionals use observation of system behavior to detect, understand, and stop new, unknown attacks. The Observe Data Lake approach gives customers the power they need to see how systems and people interact over time. Better security for less spend with Observe. We’ve been surveying the Observability field for years at Observe via our State of Observability Report, but this year is our first survey to focus on Security Observability. We talked to 500 security professionals to understand their current approach to security and how it’s intersecting with observability.

(more available)
Added: April 12, 2024
image from The 2024 State of Threat Hunting

The 2024 State of Threat Hunting

The report raises a number of interesting findings, which you’ll read about in the pages to come. However, one through line that emerges is the need for reliable threat intelligence and its impact on threat hunters’ ability to do their jobs well. Threat intelligence, or lack thereof, is a commonality across the top challenges respondents identified. Access to threat intelligence also affects nearly every aspect of how respondents say they do their jobs.

(more available)
Added: March 19, 2024
image from AI Threat Landscape Report 2024

AI Threat Landscape Report 2024

In this report, we shed light on these vulnerabilities and how they impact commercial and federal organizations today. We provide insights from a survey of IT security and data science leaders navigating these challenges. We share predictions driven by data from HiddenLayer’s experiences securing AI in enterprise environments. Lastly, we reveal cutting-edge advancements in security controls for AI in all its forms.

(more available)
Added: March 12, 2024
image from The 2023 Geography of Crytocurrency Report

The 2023 Geography of Crytocurrency Report

The goal of the index is simple: We combine on-chain data and real-world data to measure which countries are leading the world in grassroots crypto adoption. Grassroots crypto adoption isn’t about which countries have the highest raw transaction volumes — anyone could probably guess that the biggest, wealthiest countries are far ahead there. Instead, we want to highlight the countries where average, everyday people are embracing crypto the most. To do that, we’ve designed the Global Crypto Adoption Index to identify countries where the most people are putting the greatest share of their wealth into cryptocurrency.

(more available)
Added: March 5, 2024
image from 2023 Cybersecurity Year In Review

2023 Cybersecurity Year In Review

Built on passion and expertise, Altitude Cyber delivers strategic advisory services specifically tailored for founders, investors, startups, and their boards. Our unique approach fuses strategic insight with financial acumen to help your company soar to new heights.

(more available)
Added: March 4, 2024
image from 2024 Sate of IT Operations Report

2024 Sate of IT Operations Report

In this year’s report, 500 U.S.-based ITOps professionals express how automation increases their IT agility –reducing costs and enhancing endpoint management capabilities. The report also reveals that less than half (44%) of organizations have high ITOps agility, with the most agile showing mature uses of AI and workflow automation tools.

(more available)
Added: February 22, 2024
image from 2024 Insider Threat Report

2024 Insider Threat Report

Our goal is that this report serves as a crucial resource in enhancing your strategies and defenses in the battle to protect your organization’s assets and integrity against insider risks. This survey, capturing responses from 467 cybersecurity professionals across diverse sectors, seeks to uncover the nature of insider threat challenges faced by organizations, focusing on understanding the factors driving these threats, their detection and mitigation complexities, and the effectiveness of insider threat programs.

(more available)
Added: February 14, 2024
image from Q4 2023: Global Insurance Market Review

Q4 2023: Global Insurance Market Review

Over the course of the year, insurers responded to these and other dynamics of the risk and insurance environment by implementing their own resiliency measures, some of which impacted insurance market conditions. They undertook various measures, including refocusing their appetite, adjusting their underwriting policies, shifting their pricing models, streamlining their organizations, and aligning with business partners who share their values.

(more available)
Added: February 8, 2024
image from Trend Micro Security Predictions for 2024

Trend Micro Security Predictions for 2024

2024 is poised to be a hotbed for new challenges in cybersecurity. As both economic and political terrains continue to undergo digitization, enterprises will increasingly leverage artificial intelligence and machine learning (AI/ML), the cloud, and Web3 technologies. While these innovations are expected to lend a hand to organizations, they also provide opportunities for cybercriminals by promising big returns, more streamlined operations on wider impact zones, and more targeted victims. In this report, we detail the focal points of next year’s threat landscape, along with insights and recommended mitigation measures from our team of cybersecurity experts that are designed to guide decision-makers toward well-informed choices.

(more available)
Added: February 7, 2024
image from 2024 Cloud Native Security and Usage Report

2024 Cloud Native Security and Usage Report

The Sysdig 2024 Cloud‑Native Security and Usage Report comes at an exciting time after a year of cybersecurity making headlines worldwide. This is indicative of how broad the security landscape has grown in a short amount of time, thanks to the cloud. This report looks at real‑world data to draw conclusions about the state of cloud security. From our perspective, we see that organizations continue to struggle with the shift‑left concept. Although runtime threat prioritization has greatly reduced vulnerabilities, there remains an urgency for powerful and speedy cloud threat detection and response (TDR).

(more available)
Added: February 3, 2024
image from Global Cybersecurity Outlook 2024

Global Cybersecurity Outlook 2024

The 2024 Global Cybersecurity Outlook (GCO) finds that organizations that maintain minimum viable cyber resilience – that is, a healthy middle grouping of organizations – are disappearing. Organizations reporting such a minimum viable cyber resilience are down 31% since 2022.

(more available)
Added: January 12, 2024
image from Cyber attack readiness report 2023

Cyber attack readiness report 2023

To help businesses measure cyber attack readiness, we analyzed performance data from the 982 corporate security teams and 5,117 professionals who participated in our global CTF competition. HTB Business CTF: The Great Escape featured over 30 hacking challenges based on the live threat landscape covering areas such as forensics, blockchain, cloud, and more.

(more available)
Added: December 19, 2023
image from Executive Perspectives on Top Risks

Executive Perspectives on Top Risks

The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organization’s business model and strategy on very short notice. This report contains results from our 11th annual worldwide risk survey of directors and executives to obtain their views on the extent to which a broad collection of risks is likely to affect their organizations over the next year - 2023. We analyze variances across different sizes and types of organizations, industry and respondent position, in addition to variations among organizations based in different geographic regions.

(more available)
Added: December 19, 2023
image from The Telemetry Blueprint: Turning Vast Data Into Business Insights

The Telemetry Blueprint: Turning Vast Data Into Business Insights

This white paper explores the 5-step process, highlighting our findings across many data sources and rigorous testing of our telemetry pipeline. As we detail our methodology, we’ll also suggest different use cases. The goal is to showcase our journey and equip you with the tools and understanding to optimize your telemetry data.

(more available)
Added: October 26, 2023
image from Security Considerations 2023

Security Considerations 2023

The annual Cybersecurity considerations report identifies eight considerations that CISOs should prioritize in the year ahead as they seek to accelerate recovery times, reduce the impact of incidents on employees, customers and partners and aim to ensure their security plans enable — rather than expose — the business. The report also explores the key actions CISOs should take to meet the challenges ahead and to help ensure security is the organization’s golden thread, woven into the business across the board — providing the basis for trust.

(more available)
Added: October 18, 2023
image from State of the CISO 2023

State of the CISO 2023

In this survey, we set out to discover how the digital-first economy has specifically impacted the role of the CISO/CSO. In addition to bringing awareness to the evolving role of the CISO, the survey strove to delve into the broader business ramifications of these changes, so organizations can better understand how digital initiatives are impacting risk and how companies can better protect themselves.

(more available)
Added: September 20, 2023
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 20:08 UTC (build b1d7be4)