Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Intellectual property

Below you will find reports with the tag of “Intellectual property”

image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

This report explores many different areas of cybersecurity in 2020, including how ransomware has changed, why nation-state actors have been so motivated to target organizations, and also the growing importance of layering security transformation into your digital transformation strategies. (more available)
Added: January 29, 2021
image from Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

This report breaks down several of the most common and most prominent types of cyber threats that impact automobile manufacturers and retailers. (more available)
Added: December 18, 2020
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

A survey of 2,200 IT professionals from organizations of 250 or more employees. Focuses on attitudes on and about cybersecurity.
Added: November 21, 2020
image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners. (more available)
Added: June 13, 2020
image from Ripples Across the Risk Surface

Ripples Across the Risk Surface

Using breach data from Advisen, this report defines ripple effects of breaches as the impacts on companies more than one degree of separation from the company directly affected by the breach. (more available)
Added: June 10, 2020
image from Banking on Security

Banking on Security

In this report, we will address the aforementioned questions using data that Forescout Technologies has carefully gathered, tested and validated from all forms of device networks and the applications they support. (more available)
Added: May 8, 2020
image from Data Security Portfolio Vendors, Q2 2019

Data Security Portfolio Vendors, Q2 2019

In our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee, Micro Focus, Microsoft, Oracle, Symantec, and Varonis — and researched, analyzed, and scored them. (more available)
Added: February 12, 2020
image from 2019 Data Exposure Report

2019 Data Exposure Report

The 2019 Data Exposure Report is based on our survey of 1,028 information security leaders, as well as 615 business decision-makers, all with budgetary decision-making power. (more available)
Added: February 6, 2020
image from IRDETO Global Connected Industries Cybersecurity Survey: IOT Cyberattacks Are the Norm, The Security Mindset Isn't

IRDETO Global Connected Industries Cybersecurity Survey: IOT Cyberattacks Are the Norm, The Security Mindset Isn't

The Irdeto Global Connected Industries Cybersecurity Survey polled 700 security decision makers across Connected Health, Connected Transport and Connected Manufacturing plus IT and technology* (who manufacture IoT devices) industries about cyberattacks targeting their organization, concerns about the types of attacks that could target their organization, security measures currently in place and much more. (more available)
Added: July 10, 2019
image from Risk Maps 2019

Risk Maps 2019

Aon is supporting its global clients to respond to political risks and security challenges by using the analysis derived from the maps to inform the creation of a more robust risk management programme. (more available)
Added: July 10, 2019
image from Military and Security Developments Involving the People's Republic of China 2019

Military and Security Developments Involving the People's Republic of China 2019

A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended
Added: May 18, 2019
image from The Cost Of Third-Party Cybersecurity Risk Management

The Cost Of Third-Party Cybersecurity Risk Management

CyberGRX and Ponemon Institute surveyed over 600 IT security professionals to learn more about the cost and efficacy of the tools and processes used to conduct third-party cyber risk management today. (more available)
Added: April 19, 2019
image from The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

Ponemon Institute is pleased to present The Value of Threat Intelligence: Annual Study of North American and United Kingdom Companies, sponsored by Anomali. (more available)
Added: March 1, 2019
image from State Of Executive Cybersecurity Awareness

State Of Executive Cybersecurity Awareness

From the report, “Let’s face it: senior leaders at organizations across the globe are already pressed for their time and attention. (more available)
Added: February 18, 2019
image from 2018 Legal Threat Report

2018 Legal Threat Report

From the one page report, “From trade secrets to client information, legal services and law firms have an ethical and legal obligation to protect privileged data. (more available)
Added: February 5, 2019
image from 2018 Healthcare Threat Report

2018 Healthcare Threat Report

From this one page report, “Healthcare organizations possess some of the most valuable information exchanged on the black market, including social security numbers, patient records, financial information and intellectual property. (more available)
Added: February 5, 2019
image from Cybersecurity During A Merger

Cybersecurity During A Merger

Cybersecurity has emerged as a key risk factor to be weighed during the due diligence process of any merger and acquisition. (more available)
Added: January 1, 2019
image from Too Much Information

Too Much Information

In this research, Digital Shadows assessed the sensitive data exposed from some of the most ubiquitous file sharing services across the Internet. (more available)
Added: December 5, 2018
image from The ISACA/CMMI Institute Cybersecurity Culture Report: Narrowing The Culture Gap For Better Business Results

The ISACA/CMMI Institute Cybersecurity Culture Report: Narrowing The Culture Gap For Better Business Results

This paper aims to provide help in understanding how to better the cybersecurity culture in an organization.
Added: December 4, 2018
image from IT Talent Acquisition; the recruiter's view

IT Talent Acquisition; the recruiter's view

“This inaugural report looks at the in-house recruiter’s view of talent acquisition. Which recruitment channels get the most investment, what are the most effective tools and what would make acquisition easier? (more available)
Added: November 24, 2018
image from IT Talent Acquisition; the candidate's view

IT Talent Acquisition; the candidate's view

“This is the first in an annual report that looks at the candidate’s view of acquisition and retention. Where do candidates look for IT jobs, what makes them apply, why do they leave and why do they stay? (more available)
Added: November 24, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2022
Library updated: July 5, 2022 04:08 UTC (build d6199b1)