Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Impact

Below you will find reports with the tag of “Impact”

image from The 5 Foundational DevOps Practices: How To Establish And Build On Them

The 5 Foundational DevOps Practices: How To Establish And Build On Them

From the report, “The Puppet 2018 State of DevOps Report took a new tack this year, seeking prescriptive guidance for teams to follow. We designed our survey to learn how organizations progress through their DevOps journeys, and after analyzing the data, we found that the successful ones go through specific stages. Our research also revealed a set of core practices — we call them “foundational practices” — that are critical to success throughout the entire DevOps evolution. In this paper, we’ll take you through an in-depth description of these foundational practices, and offer you our advice for how to begin instituting them in the way that makes most sense for your organization, based on our findings.”

(more available)
Added: January 24, 2019
image from Automate The Hunt

Automate The Hunt

This paper provides insight into the tools an IT security pro needs to rapidly hunt, find and investigate dynamic threat indicators.

(more available)
Added: December 29, 2018
image from Translating Security Leadership into Board Value

Translating Security Leadership into Board Value

A thought piece on trends that are occuring at the senior leadership levels of security professionals. Some survey data is refererenced, though it is unclear if a new survey was conducted for some of the trends identified in this report.

(more available)
Added: November 27, 2018
image from CIO'S Guide to Modern Identity

CIO'S Guide to Modern Identity

These days, IAM is a moving target being moved by the forces of cloud, mobile and increasingly connected consumers. By keeping these five trends in mind, and understanding the security and access control needs of your enterprise, you can make decisions that’ll benefit you today, while providing a good foundation for future evolution.

(more available)
Added: November 27, 2018
image from Certificate Authority Compromise: How Quickly Can Financial Services Restore Trust

Certificate Authority Compromise: How Quickly Can Financial Services Restore Trust

This paper cites a Dimensional Research survey of 250 IT security professionals in financial services organizations located in the U.S., U.K., Germany, France and Australia. The survey examines the challenges faced by the financial services industry in managing certificates, and the results illustrate the importance of incorporating CA-agility into a certificate management strategy. The survey also explores the federal government and other industries, including healthcare, retail and technology.

(more available)
Added: November 6, 2018
image from Risk and Regulatory Outlook 2015

Risk and Regulatory Outlook 2015

In this edition of Risk and Regulatory Outlook a Deloitte subject matter expert outlines the situation, specifies existing or prescient change, and suggests practical steps in each of the nine key areas of regulatory change we focus on.

(more available)
Added: October 24, 2018
image from Reporting on Risk to the Board

Reporting on Risk to the Board

This is a good report to read if you are interested in learning how to properly, and succesfully, report risks and vulnerabilities to boardmembers and executives.

(more available)
Added: October 23, 2018
image from The State of Online Privacy 2016

The State of Online Privacy 2016

This is a press release regarding a s study that finds more British Internet users are concerned about data privacy than losing their income.

(more available)
Added: October 23, 2018
image from NIST Special Publication 800-171 for higher educatino

NIST Special Publication 800-171 for higher educatino

This is a guide that is especially designed to help colleges and universities comply with new federal regulations.

Added: October 22, 2018
image from Beneath the surface of a cyberattack

Beneath the surface of a cyberattack

In Beneath the Surface of a Cyberattack: A Deeper Look at Business Impacts, Deloitte has leveraged their experience with a variety of cyber incidents and their deep industry knowledge to illustrate how 14 impact factors—including many that are not often visible—can affect an organization in the days, months, and years following a cyberattack.

(more available)
Added: October 20, 2018
image from Cyber Value at Risk

Cyber Value at Risk

This paper was written to help Enterprises prioritize cyber security activities in real time based on potential financial loss.

Added: October 20, 2018
image from DDoS Attacks Advancing and Enduring: A SANS Survey

DDoS Attacks Advancing and Enduring: A SANS Survey

Distributed denial of service (DDoS) attacks continue to grow in frequency, sophistication and bandwidth. Due to a recent SANS survey, 378 security and network managers reveal that they are experiencing more frequent and sophisticated DDoS attacks These and other trends are discussed in the rest of this report.

(more available)
Added: October 20, 2018
image from Lack Of Visibility Drives Public Cloud Security Risk

Lack Of Visibility Drives Public Cloud Security Risk

Ixia recently commissioned Dimensional Research to conduct a survey of cloud users to understand their top concerns about managing cloud operations. This report provides details about their findings.

(more available)
Added: October 20, 2018
image from The Art Of Organizing And Simplifying IT Support

The Art Of Organizing And Simplifying IT Support

Learn easy and effective ways for IT pros to manage help desk tickets and simplify the job of supporting end-users.

(more available)
Added: October 20, 2018
image from A 360-Degree Guide To Choosing And Migrating To A New Email Client

A 360-Degree Guide To Choosing And Migrating To A New Email Client

This white paper seeks to offer some insight into migrating to a new email client.

Added: October 19, 2018
image from 2017 Threat Monitoring Report

2017 Threat Monitoring Report

This report is based on a survey of a wide number of cybersecurity professionals, and deals with a variety of issues ranging from the threat landscape to incident recovery.

(more available)
Added: October 17, 2018
image from The Executive Cyber Security Playbook

The Executive Cyber Security Playbook

In this ebook, FireEye explains why senior executives must be more proactive about cyber security — before, during and after an event — and how they can help create and maintain a strong security posture.

(more available)
Added: October 16, 2018
image from Cybersecurity Poverty Index

Cybersecurity Poverty Index

The second annual RSA Cybersecurity Poverty Index is the result of an annual maturity self-assessment completed by 878 individuals across 24 industries. The assessment was created using the NIST Cybersecurity Framework (CSF) as the measuring stick to provide global insight into how organizations rate their overall cybersecurity maturity and practices. This report presents what was learned.

(more available)
Added: October 15, 2018
image from The Global State Of Online Digital Trust

The Global State Of Online Digital Trust

The digital trust perception gap, and other findings in this ground-breaking study, highlight the need for business leaders to understand how much consumers trust organizations, what drives digital trust, and the business impact of losing that trust.

(more available)
Added: October 15, 2018
image from Most Companies Unprepared For DNS Attacks

Most Companies Unprepared For DNS Attacks

As such, this survey sought to explore the state of DNS security in the cybersecurity/IT market, discover how highly IT and cybersecurity professionals rank DNS security, and gauge the strength of the DNS protections enterprises have in place.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)