Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Misconfiguration

Below you will find reports with the tag of “Misconfiguration”

image from 2022 Cloud Security Report

2022 Cloud Security Report

This 2022 Cloud Security Report, based on a comprehensive global survey of cybersecurity professionals, reveal these security challenges and offers insights on the state of the cloud and cloud security today. The study reviews organizations’ choices and responses as they try to gain more confidence in securing their cloud environments.

(more available)
Added: May 20, 2022
image from The State of Cloud Security 2021

The State of Cloud Security 2021

For the State of Cloud Security 2021, we surveyed 300 cloud professionals, including cloud engineers, cloud security engineers, DevOps, and cloud architects, to better understand the risks, costs, and challenges they are experiencing managing cloud security at scale.

(more available)
Added: May 19, 2022
image from 2022 SaaS Security Survey Report

2022 SaaS Security Survey Report

The goal of this survey was to understand the current state of SaaS security and misconfigurations. The survey was conducted online by CSA from January to February 2022 and received 340 responses from IT and security professionals from various organization sizes and locations. CSA’s research team performed the data analysis and interpretation for this report.

(more available)
Added: May 19, 2022
image from The State of Pentesting: 2020

The State of Pentesting: 2020

The State of Pentesting: 2020 report assesses which web application security vulnerabilities can be found reliably using machines and which require human expertise to manually identify. The scope of his exploration is black-box penetration testing (“humans”) against dynamic scanning and out-of-band testing (“machines”) for web applications.

(more available)
Added: May 16, 2022
image from Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report

Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report

Through a comparison of 1,000 enterprise organizations surveyed worldwide and real-world cloud use, this report uncovers the rise of Cloud-Native Breaches, disconnect between security practitioners and their leadership, and the state of multicloud adoption. Recommendations are given to defend against the new wave of Cloud-Native Breaches unique to Infrastructure-as-a-Service (IaaS) environments.

(more available)
Added: February 15, 2022
image from Web Application Vulnerability Report 2020

Web Application Vulnerability Report 2020

A review of web application vulnerabilities as seen through Acuentix’s web scans between March 2019 and February 2020.

Added: September 30, 2020
image from 2020 State of Hybrid Cloud Security

2020 State of Hybrid Cloud Security

FireMon’s second annual State of Hybrid Cloud Security report dives into how the proliferation of cloud environments is impacting enterprises and their ability to scale and protect them.

(more available)
Added: September 25, 2020
image from Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

An extension of the Prioritization to Prediction series, this report uses a sample of over 40 manufacturing sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Healthcare Sector

Vulnerability Remediation Performance Snapshot for the Healthcare Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 30 healthcare sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Finance Sector

Vulnerability Remediation Performance Snapshot for the Finance Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 100 finance sector firms to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Vulnerability Remediation Performance Snapshot for the Technology Sector

Vulnerability Remediation Performance Snapshot for the Technology Sector

An extension of the Prioritization to Prediction series, this report uses a sample of approximately 70 technology services to better understand the means and metrics of vulnerability management with the sector.

(more available)
Added: September 23, 2020
image from Under the Hoodie 2020

Under the Hoodie 2020

A review of lessons learned over the past year from Rapid7’s penetration testing services. Combined with survey day on social engineering and red team simulations of 206 engagements.

(more available)
Added: August 28, 2020
image from 2020 Mid Year Report

2020 Mid Year Report

This mid year report covers publicly disclosed data breaches first reported between January 1, 2020 and June 30, 2020 and compares current observations to the same time period for prior years.

(more available)
Added: August 17, 2020
image from 2020 Security Effectiveness Report

2020 Security Effectiveness Report

This report focuses on an analysis of security controls effectiveness across the multiple stages of attack lifecycles within 11 global industries. To gather data, our experts executed thousands of tests comprised of real attacks, specific malicious behaviors, and actor-attributed techniques and tactics. The report data provides measured evidence of leading enterprise production environments across network, email, endpoint and cloud-based security controls.

(more available)
Added: July 29, 2020
image from Oracle and and KPMG Cloud Threat Report 2020

Oracle and and KPMG Cloud Threat Report 2020

The 2020 edition of this annual survey based report on cloud adoption, migration, and security trends. Drawn from a pool of 750 global respondents with roles in evaluatng, purchasing, and managing cybersecurity products and with a high level of familiarity of their organizaiton’s public cloud use.

(more available)
Added: July 22, 2020
image from The State of Cloud Security 2020

The State of Cloud Security 2020

A survey of over 3,500 IT managers with data and workloads in the public cloud.

Added: July 9, 2020
image from 2020 Cloud Misconfigurations Report

2020 Cloud Misconfigurations Report

DivvyCloud researchers compiled this report to substantiate the growing trend of breaches caused by cloud misconfigurations, quantify their impact to companies and consumers around the world, and identify factors that may increase the likelihood a company will suffer such a breach.

(more available)
Added: July 6, 2020
image from Cloud Threat Landscape Report 2020

Cloud Threat Landscape Report 2020

Using case data from IBM’s external incident response service involvement in cloud-related security incidents over 2019, this report covers threat actors, threat actions, common control weaknesses, and makes recommendations for increase cloud security postures. Additional data contributed by Intezer and DarkOwl.

(more available)
Added: June 10, 2020
image from Untangling the Web of Cloud Security Threats

Untangling the Web of Cloud Security Threats

As more organizations move to the cloud and public cloud platforms gain more users and offer more services, cybercriminals will find ways to launch attacks and profit from compromise. As we’ve demonstrated in this research, misconfiguration in cloud services opens an organization to risks like cryptojacking, e-skimming, and data exfiltration. Container technologies in the cloud, when exposed, also pose similar risks. Finally, mismanagement of credentials and other secrets have costs that can grow as threats move across the cloud stack.

(more available)
Added: May 8, 2020
image from Cybersecurity in Building Automation Systems (BAS)

Cybersecurity in Building Automation Systems (BAS)

This report is based off the findings of a deep analysis of vulnerabilities in BAS. The results are grouped into four areas then published. The four areas are: Analysis of the security Landscape, Discovery and responsible disclosure of previously unknown vulnerabilities, Deployment of a proof of concept malware, and Discussion on how network monitoring tools can help protect.

(more available)
Added: May 8, 2020
image from Cloud Threat Report: Putting the Sec in DevOps

Cloud Threat Report: Putting the Sec in DevOps

2020 edition of the Unit 42 Cloud Threat Report, ourteam of elite cloud threat researchers focused theirattention on the practices of DevOps. The research aimedto uncover where cloud vulnerabilities are surfacing.DevOps teams are shortening the time to productionusing infrastructure as code (IaC) templates. But the IaCtemplates themselves are not the issue. It’s the flawedprocess by which they are being created.

(more available)
Added: February 14, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)