Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Planning

Below you will find reports with the tag of “Planning”

image from Top Consumer Authentication Pitfalls To Avoid

Top Consumer Authentication Pitfalls To Avoid

Digital businesses must manage, govern, and secure customers’ access to systems without hurting the customer experience. As firms increase the digital channels for customer interaction, they also increase the number of potentially confusing consumer authentication experiences. As a result, they’re hemorrhaging customers and suffering increased support costs related to password and authentication. This report outlines 10 barriers to authentication success — and how S&R pros can improve online security without sacrificing experience.

(more available)
Added: November 27, 2018
image from Identity Security Trends In The Mobile Era

Identity Security Trends In The Mobile Era

To better understand the mindset and priorities of those who make security decisions for mobile devices in the workplace, Ping Identity conducted a mobility survey in partnership with Gatepoint Research. The results shed light on four main insights into the top challenges and motivations for enterprise mobile initiatives.

(more available)
Added: November 27, 2018
image from Movement and Modernization: How the Cloud Can Poise Healthcare Organizations for the Future

Movement and Modernization: How the Cloud Can Poise Healthcare Organizations for the Future

The purpose of this white paper is to better understand the challenges that healthcare organizations face as they attempt to modernize efforts in the areas of data collection and analysis, value-based care strategies, and patient and caregiver engagement. This report will discuss how outdated technology investments hamper these efforts— especially as hospitals and other healthcare providers attempt to partner with fellow provider organizations, health information exchanges (HIEs), and accountable care organizations (ACOs) to fully take advantage of the shift to value-based care reimbursements.

(more available)
Added: November 27, 2018
image from The Future of Digital Engagement In An Age of Compliance

The Future of Digital Engagement In An Age of Compliance

To find out how European enterprise customer data leaders are tackling this complex problem, Janrain conducted more than 50 interviews (see appendix 1 for interviewee profile), the findings of which are distilled into this eBook.

(more available)
Added: November 24, 2018
image from High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows.

(more available)
Added: November 24, 2018
image from Prevention Is Better Than Cure: Business Security - The Journey Continues

Prevention Is Better Than Cure: Business Security - The Journey Continues

This year’s Risk:Value Report from NTT Security shows that there is still a lot of work to do. It crystallizes in one shocking statistic: one-third of companies would rather pay a hacker’s ransom than invest in information security. Many organizations are still stuck in a reactive mindset when it comes to security.

(more available)
Added: November 21, 2018
image from Build Pervasive Cyber Resilience Now

Build Pervasive Cyber Resilience Now

This report posits that “Companies are racing into the digital future adopting technology enabled operating and business models that drive bottom- and top- line growth. They are not prepared for the new cyber risks that come with the connected, data-driven future enterprise.” Read on to learn about solutions.

(more available)
Added: November 21, 2018
image from Building A Resilient Cybersecurity Culture

Building A Resilient Cybersecurity Culture

This report posits that “A dedicated staff with a clear mission helps retain and engage a cybersecurity workforce.” Read the report to learn more.

(more available)
Added: November 6, 2018
image from Building A Threat Intelligence Program

Building A Threat Intelligence Program

This report provides a detailed analysis of survey data that was gathered to provide research findings on best practices and impact.

(more available)
Added: November 6, 2018
image from The Machine Identity Crisis

The Machine Identity Crisis

“The use of machines is driving unprecedented improvements in business efficiency, productivity, agility and speed. With businesses increasing their reliance on machines, the number of machines on enterprise networks is growing exponentially. To communicate securely, each machine needs a unique identity to authenticate and secure communications. However, organizations’ abilities to create, manage and protect these machine identities is simply not keeping up with the pace of their evolution. "

(more available)
Added: November 6, 2018
image from Top 15 Chief Information Security Officers 2018

Top 15 Chief Information Security Officers 2018

SecurityScorecard ran an analysis, looking at the security ratings of organizations over a six month period and identified which organizations improved those scores the most; whether overall or within a specific risk area.

(more available)
Added: November 4, 2018
image from Cyber Balance Sheet: 2018 Report

Cyber Balance Sheet: 2018 Report

“In last year’s report, we sought to break down walls of misunderstanding between cybersecurity leaders and corporate directors. We continue chipping away at those walls this year, but expand the scope of our research to include a broader set of stakeholders and topics relevant to our increasingly important goal.”

(more available)
Added: November 4, 2018
image from A Practical Guide for GDPR Compliance

A Practical Guide for GDPR Compliance

This paper is a simple yet practical guide to understanding and becoming GDPR Compliant.

Added: October 26, 2018
image from Rethinking Data Security With A Risk Adaptive Approach

Rethinking Data Security With A Risk Adaptive Approach

This report discusses the idea that there needs to be a paradigm shift in the approach to cybersecurity. It posits that the shift should occur by studing human behavior and interaction with data.

(more available)
Added: October 26, 2018
image from Security Sector Reform In Ukraine

Security Sector Reform In Ukraine

This report provides a series of recommendations for the reform of Ukraine’s security and defense institutions. It covers a wide range of topics including cyber warfare. This research was under- taken in response to a request by the presidential administration of Ukraine and in participation with the National Security and Defense Council and sponsored by Ukraine Investment Alliance, a 501(c)(4) foundation. Research for this report was completed in the fall of 2015. Although some minor updates have been made, the analysis predomi- nantly reflects the situation as of that time.

(more available)
Added: October 26, 2018
image from State Of The Endpoint 2017

State Of The Endpoint 2017

This report seeks to provide answers to many questions related to the failures of endpoint security that are occuring even though there has been a shift in technology and strategy.

(more available)
Added: October 26, 2018
image from The 2018 Global Cloud Data Security Study

The 2018 Global Cloud Data Security Study

This year’s study reveals the increasing risk of noncompliance with new global privacy and data protection regulations. Another important trend over the past three years is IT security’s continuing loss of control over cloud security practices and budget.

(more available)
Added: October 26, 2018
image from China's Evolving Approach To "Integrated Strategic Deterrence"

China's Evolving Approach To "Integrated Strategic Deterrence"

This report looks at China’s evolving approach to integrated strategic deterrence. Drawing on a variety of Chinese military writings, this report explores the origins of this concept, how it relates to Chinese development of counter-intervention capabilities, and how Beijing’s assessment of its external security environment influences its requirements.

(more available)
Added: October 25, 2018
image from IT Security at SMBs: 2017 Benchmarking Survey

IT Security at SMBs: 2017 Benchmarking Survey

This report presents the results of an in-depth primary market research survey of cyber security decision-makers in small to mid-sized businesses in the United States, conducted during August and September 2017. The goal of their research was to understand how SMBs, undertake decision-making in the context of their internet security, how they evaluate security solutions, and their budgetary concerns.

(more available)
Added: October 25, 2018
image from Rethink The Role Of The CMO

Rethink The Role Of The CMO

In February 2018, Accenture Interactive commissioned Forrester Consulting to evaluate the current and future role of the CMO in building and delivering experiences and the need for organizationwide collaboration. In July 2018, Forrester conducted 10 interviews and an online survey with 250 senior-level marketing decision makers from a range of industries to explore this topic.

(more available)
Added: October 25, 2018
image from Strengthening Digital Society Against Cyber Shocks

Strengthening Digital Society Against Cyber Shocks

This report is based on the key findings from The Global State of Information Security Survey.

Added: October 25, 2018
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)