Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

InfoSec market

Below you will find reports with the tag of “InfoSec market”

image from The State of Cloud Native Security Report 2022

The State of Cloud Native Security Report 2022

Palo Alto Networks surveyed 3,000 cloud security and DevOps professionals from around the world to gain insight into organizations’ cloud adoption strategies, budgets, experiences, and future plans. (more available)
Added: January 20, 2022
image from McAfee Labs Threats Report, April 2021

McAfee Labs Threats Report, April 2021

This report incorporates not only the malware zoo, but new analysis for what is being detected in the wild. Also added: statistics detailing the top MITRE ATT&CK techniques observed in Q4 2020 from Criminal/APT groups. (more available)
Added: January 14, 2022
image from Cyber Insurance: A Hard Reset

Cyber Insurance: A Hard Reset

An insurance oriented treatment on key trends impacting cyber insurance, based upon meta-analysis from several sources, including Advisen, McKinsey, Sophos and others. (more available)
Added: September 29, 2021
image from Prioritization to Prediction Volume 7: Establishing Defender Advantage

Prioritization to Prediction Volume 7: Establishing Defender Advantage

Do exploit code releases help or harm defenders? We decided to put this hotly contested debate to the test. The seventh volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute attacks this debate from all angles. (more available)
Added: May 13, 2021
image from Identity and Access Management: The Stakeholder Perspective

Identity and Access Management: The Stakeholder Perspective

This report aims to capture hard data on the experiences of stakeholders who are impacted by IAM processes and technologies, and the impact of current IAM practices on security risks and business operations. (more available)
Added: February 22, 2021
image from Sunburst Backdoor - Code Overlaps with Kazuar

Sunburst Backdoor - Code Overlaps with Kazuar

This report looks at the malware used by a group called Sunburst. It gives a detailed timeline of attacks, and the code used in them. (more available)
Added: January 11, 2021
image from Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

Prioritization to Prediction: Volume 6 - The Attacker-Defender Divide

This sixth volume of the Prioritization to Prediction series combines vulnerability data from Kenna’s customers with additional intelligence from Fortinet and others. (more available)
Added: November 18, 2020
image from Protecting Data Privacy to Maintain Digital Trust

Protecting Data Privacy to Maintain Digital Trust

This study explores data privacy challenges for organizations that are trying to maintain digital trust with their customers, along with the evolving privacy landscape and its impact on consumers. (more available)
Added: October 25, 2020
image from Cyber Insurance - The Market's View

Cyber Insurance - The Market's View

A survey of 260 cyber insurance brokers and 190 cyber insurers, on the challenges and opportunities in the cyber insurance space. (more available)
Added: October 6, 2020
image from 10 in 10 Report 2020

10 in 10 Report 2020

This report looks at the 10 most impactful factors in cybersecurity success for the next decade.
Added: September 27, 2020
image from 2020 Cyber Risk Outlook

2020 Cyber Risk Outlook

A survey of 1,000 insurance professionals and risk managers from 56 countries on their beliefs on the impact of COVID-19 and cyber exposure. (more available)
Added: September 24, 2020
image from State of Cloud Security In 2020: DDoS and WAF

State of Cloud Security In 2020: DDoS and WAF

The 2020 Intricately Cloud Security Market Report unpacks global cloud security trends surrounding the growth of application security.
Added: September 1, 2020
image from Simplify to Secure: Reduce complexity by integrating your security ecosystem

Simplify to Secure: Reduce complexity by integrating your security ecosystem

This report explains the findings of a study the did, showing that seeking the exact technology to solve your newest, most pressing security concern may actually be multiplying security gaps that slow you down instead of simplifying your security environment. (more available)
Added: July 29, 2020
image from Cyber security skills in the UK labour market

Cyber security skills in the UK labour market

A review of the cybersecurity job market in the UK, the nature and extent of skill gaps and shortages. A combination of surveys, qualitative research with firms, and a review of job postings. (more available)
Added: July 27, 2020
image from Vulnerabilities in the Core

Vulnerabilities in the Core

This report sought to understand the health and security of Free and Open Source Software (FOSS) as it is today. It identifies the most commonly used free and open source software components in production applications, and examines them for potential vulnerabilities. (more available)
Added: June 29, 2020
image from State of Cybersecurity Report 2020

State of Cybersecurity Report 2020

The third edition of Infosecurity Magazine’s annual report. A survey of 75 respondants with approximately 1/3 academic, 1/3 industry, and 1/3 investors. (more available)
Added: June 22, 2020
image from Fortinet Survey Finds Widespread Impact from Cybersecurity Skills Shortage

Fortinet Survey Finds Widespread Impact from Cybersecurity Skills Shortage

A survey-based report from March 2020 on the impacts of staff shortages in the cybersecurity industry. A special focus on remote work and COVID-19 impacts. (more available)
Added: May 28, 2020
image from Big Security in a Small Business World

Big Security in a Small Business World

This report from Cisco proves 10 cyber security myths false.
Added: May 11, 2020
image from Dark Commerce: Exploring the Cybercrime Industry and it's Business Models

Dark Commerce: Exploring the Cybercrime Industry and it's Business Models

This report, the first in a series from Blueliv offering an overview of cybercrimeindustry, detailed some features of a rapidly growing cybercriminal serviceseconomy. (more available)
Added: April 5, 2020
image from State of the Internet / Security Vol. 6: Financial Services — Hostile Takeover Attempts

State of the Internet / Security Vol. 6: Financial Services — Hostile Takeover Attempts

This is the 6th annual SOTI from Akamai. The Key findings are: • Between November 2017 and October 2019, more than 40% of the unique DDoS targets were in the financial services industry • Traditional logins (username and password) still account for the majority (74%) of access methods to applications and services • From May to October 2019, credential stuffing attacks targeting the financial services industry have targeted APIs, often accounting for 75% or more of the total login attacks against financial services
Added: March 1, 2020
image from Worldwide Security Spending Guide

Worldwide Security Spending Guide

The Worldwide Security Spending Guide examines the security opportunity from a technology, industry, company size, and geography perspective. This comprehensive database delivered via IDC’s Customer Insights query tool allows the user to easily extract meaningful information about the security technology market by viewing data trends and relationships and making data comparisons. (more available)
Added: February 14, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 28, 2022 08:08 UTC (build d6199b1)