Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Human error

Below you will find reports with the tag of “Human error”

image from SANS 2022 Cloud Security Survey

SANS 2022 Cloud Security Survey

The goal of the SANS 2022 Cloud Security Survey is to provide additional insight into how organizations are using cloud today, the threats security teams are facing in the cloud, and what we are doing to improve security posture in the cloud, as well. (more available)
Added: June 28, 2022
image from Sysdig 2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report

In this report, you will find details about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries. (more available)
Added: June 28, 2022
image from SANS 2021 Cloud Security Survey

SANS 2021 Cloud Security Survey

The goal of the SANS 2021 Cloud Security Survey is to provide additional insights into how organizations are using the cloud today, the threats security teams are facing in the cloud, and what they’re doing to improve security posture in the cloud. (more available)
Added: June 28, 2022
image from Sysdig 2021 Container Security and Usage Report

Sysdig 2021 Container Security and Usage Report

In this report, you will find further detail about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries. (more available)
Added: June 28, 2022
image from Sysdig 2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report

These findings are based on the data we gather front the billions of containers that our customers run over the course of a year. (more available)
Added: June 21, 2022
image from Radware 5G Protection

Radware 5G Protection

Service providers are undergoing a technological revolution, transforming their networks and computing infrastructure to dramatically change the user experience and support new services in an app-driven world tailored to industry and business objectives. (more available)
Added: June 21, 2022
image from The State of Password Security In The Enterprise

The State of Password Security In The Enterprise

A recent Authentication Security Strategy survey by Enzoic and Redmond magazine revealed insights into the way that passwords are currently being used in various organizations, and what the future looks like regarding this ubiquitous authentication method. (more available)
Added: May 31, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

This 2022 Cloud Security Report, based on a comprehensive global survey of cybersecurity professionals, reveal these security challenges and offers insights on the state of the cloud and cloud security today. (more available)
Added: May 20, 2022
image from The State of Cloud Security 2021

The State of Cloud Security 2021

For the State of Cloud Security 2021, we surveyed 300 cloud professionals, including cloud engineers, cloud security engineers, DevOps, and cloud architects, to better understand the risks, costs, and challenges they are experiencing managing cloud security at scale. (more available)
Added: May 19, 2022
image from 2022 SaaS Security Survey Report

2022 SaaS Security Survey Report

The goal of this survey was to understand the current state of SaaS security and misconfigurations. The survey was conducted online by CSA from January to February 2022 and received 340 responses from IT and security professionals from various organization sizes and locations. (more available)
Added: May 19, 2022
image from The State of Pentesting: 2020

The State of Pentesting: 2020

The State of Pentesting: 2020 report assesses which web application security vulnerabilities can be found reliably using machines and which require human expertise to manually identify. (more available)
Added: May 16, 2022
image from Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report

Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report

Through a comparison of 1,000 enterprise organizations surveyed worldwide and real-world cloud use, this report uncovers the rise of Cloud-Native Breaches, disconnect between security practitioners and their leadership, and the state of multicloud adoption. (more available)
Added: February 15, 2022
image from Cybersecurity is Shifting: 8 Essential Trends for 2022

Cybersecurity is Shifting: 8 Essential Trends for 2022

The pandemic has changed everything. What strategies are CISOs and other security leaders implementing to ensure their organizations are secure in today’s uncertain environment? (more available)
Added: January 12, 2022
image from 2021 Voice of the CISO Report

2021 Voice of the CISO Report

A survey of CISOs across 1,400 organizations supplemented with interviews of 100 individuals.
Added: May 17, 2021
image from Prioritization to Prediction Volume 7: Establishing Defender Advantage

Prioritization to Prediction Volume 7: Establishing Defender Advantage

Do exploit code releases help or harm defenders? We decided to put this hotly contested debate to the test. The seventh volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute attacks this debate from all angles. (more available)
Added: May 13, 2021
image from Web Application Vulnerability Report 2020

Web Application Vulnerability Report 2020

A review of web application vulnerabilities as seen through Acuentix’s web scans between March 2019 and February 2020.
Added: September 30, 2020
image from 2020 State of Hybrid Cloud Security

2020 State of Hybrid Cloud Security

FireMon’s second annual State of Hybrid Cloud Security report dives into how the proliferation of cloud environments is impacting enterprises and their ability to scale and protect them. (more available)
Added: September 25, 2020
image from 2020 Cyber Risk Outlook

2020 Cyber Risk Outlook

A survey of 1,000 insurance professionals and risk managers from 56 countries on their beliefs on the impact of COVID-19 and cyber exposure. (more available)
Added: September 24, 2020
image from Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

An extension of the Prioritization to Prediction series, this report uses a sample of over 40 manufacturing sector firms to better understand the means and metrics of vulnerability management with the sector. (more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Healthcare Sector

Vulnerability Remediation Performance Snapshot for the Healthcare Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 30 healthcare sector firms to better understand the means and metrics of vulnerability management with the sector. (more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Finance Sector

Vulnerability Remediation Performance Snapshot for the Finance Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 100 finance sector firms to better understand the means and metrics of vulnerability management with the sector. (more available)
Added: September 23, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2022
Library updated: July 1, 2022 04:08 UTC (build d6199b1)