Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Insider

Below you will find reports with the tag of “Insider”

image from 2021 Insider Landscape Report

2021 Insider Landscape Report

The 2021 Insider Landscape Report reveals the latest trends and challenges facing organizations in this new environment. The report explores how IT and cybersecurity professionals deal with risky insiders and how organizations are preparing to better protect their critical data and IT infrastructure.

(more available)
Added: October 18, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

(more available)
Added: October 18, 2022
image from Managed Security Report 2022

Managed Security Report 2022

The 2022 Managed Security Report reveals the latest trends and attitudes toward managed security, answering why organizations invest in security outsourcing, what challenges they are facing, and what requirements companies are prioritizing. This report is based on the results of a comprehensive online survey of IT and cybersecurity professionals conducted in 2022.

(more available)
Added: October 18, 2022
image from 2022 Endpoint Security Report

2022 Endpoint Security Report

The 2022 Endpoint Security Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing.

(more available)
Added: October 14, 2022
image from 2022 Vulnerability Management Report

2022 Vulnerability Management Report

The 2022 Vulnerability Management Report is based on a comprehensive survey of over 390 cybersecurity professionals in September 2022 to gain insights into the latest trends, key challenges and solutions preferences for vulnerability management.

(more available)
Added: October 12, 2022
image from 2022 AWS Cloud Security Report

2022 AWS Cloud Security Report

This report is based on comprehensive survey of 578 cybersecurity professionals to reveal how AWS user organizations are responding to evolving cloud security threats, and what tools and best practices cybersecurity leaders prioritize as their cloud infrastructures mature.

(more available)
Added: October 12, 2022
image from Security Visibility Report 2022

Security Visibility Report 2022

This report surveyed 278 cybersecurity professionals to reveal the key challenges regarding security visibility, how organizations solve this issue, and the security capabilities organizations prioritize.

(more available)
Added: October 12, 2022
image from State of Cloud Native Application Security

State of Cloud Native Application Security

As companies embrace cloud native technologies as part of their digital transformation, security is seen as a key factor to building successful platforms. While only 36% of respondents stated that security was one of the main reasons for moving their production applications into containers, 99% of respondents recognize that security as an important element in their cloud native strategy.

(more available)
Added: September 28, 2022
image from SIEM Report 2022

SIEM Report 2022

The 2022 SIEM Report is based on a survey of 348 cybersecurity professionals and represents one of the industry’s most comprehensive annual studies on SIEM, exploring the latest trends, key challenges, and solution preferences in this market.

(more available)
Added: July 5, 2022
image from Insider Risk Report 2022

Insider Risk Report 2022

The 2022 Insider Risk Report is driven by real data observed as part of actual investigations of real customers with whom DTEX detected and responded to potential insider risk incidents before a breach occurred.

(more available)
Added: July 5, 2022
image from 2022 Envisions Critical Threat Report

2022 Envisions Critical Threat Report

Amid our worldwide bedlam, this report is aimed at informing for the purposes of preparation. Whether you find yourself in the midst of government affairs, technology management, or business operations, the state of rising factors impacts nearly every country, either directly or indirectly, and provides a ripe setting for cyberattacks to thrive. Based upon research conducted and shared amongst our various practices in DevSecOps, Offensive Security, Governance-Risk-Compliance, Threat Intelligence, and Research, we have completed our overall analysis to focus on the following evolving threats as we navigate through 2022.

(more available)
Added: June 21, 2022
image from Annual Data Exposure Report 2022

Annual Data Exposure Report 2022

Today, data is a company’s most valuable asset, leading many to invest in Insider Risk Management programs. Recent trends around employee turnover and remote work have created unprecedented challenges for security teams to protect valuable data from leaving the company. There needs to be most investments around educating the Broad, training employees, and increasing visibility to data movement.

(more available)
Added: June 8, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

This 2022 Cloud Security Report, based on a comprehensive global survey of cybersecurity professionals, reveal these security challenges and offers insights on the state of the cloud and cloud security today. The study reviews organizations’ choices and responses as they try to gain more confidence in securing their cloud environments.

(more available)
Added: May 20, 2022
image from 2022 Voice of the CISO Report

2022 Voice of the CISO Report

This report explores how CISOs are adjusting in the wake of pandemic disruption, adapting strategies to support long-term hybrid work and battling an increasingly sophisticated threat landscape. We also examine how people put organizations at risk and how CISOc change priorities in response.

(more available)
Added: May 18, 2022
image from Cloud and Threat Report - January 2022

Cloud and Threat Report - January 2022

Takes a look back at the top trends in cloud attacker activities and cloud data risks from 2021 compared to 2020.

(more available)
Added: January 13, 2022
image from Cybersecurity Challenges in Financial Services - Marker Survey Report

Cybersecurity Challenges in Financial Services - Marker Survey Report

This report is based on a survey of 250 cybersecurity and IT decision-makers. It aims to provide insight on cybersecurity challenges in financial services in the age of COVID-19.

(more available)
Added: November 6, 2020
image from Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

This whitepaper explains a new vulnerability in Windows Server that is highly exploitable.

Added: October 18, 2020
image from 2020 State of SaaSOps

2020 State of SaaSOps

This report gives insight on how modern IT organizations deal with the challenges of managing Saas at scale.

Added: October 11, 2020
image from Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

This report explores how the broad adoption of cloud services has affected cyber risk and fraud.

Added: September 28, 2020
image from The CISO Current Report, Q2 2020

The CISO Current Report, Q2 2020

This paper compiles observations as well as predictions on the state of cybersecurity in 2020.

Added: August 17, 2020
image from SolarWindws Public Sector Cybersecurity Survey Report

SolarWindws Public Sector Cybersecurity Survey Report

A survey of 400 public sector IT decision makers and influencers to determine challenges faced by public sector IT professionals, security threats, and cybersecurity capabilities.

(more available)
Added: July 22, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 16:09 UTC (build b1d7be4)