Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Planning

Below you will find reports with the tag of “Planning”

image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017.

(more available)
Added: October 18, 2018
image from The Internet Of Things Isn't Coming, It's Here

The Internet Of Things Isn't Coming, It's Here

This report discusses the results of a survey conducted in 2016 that asked respondents what makes something a “thing” instead of a “computer.”

(more available)
Added: October 18, 2018
image from Who Moved My Secure Perimeter

Who Moved My Secure Perimeter

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.

(more available)
Added: October 18, 2018
image from A Holistic Approach To Identity Managing For The Internet Of Things

A Holistic Approach To Identity Managing For The Internet Of Things

This whitepaper will introduce this new hierarchy of IoT IdM requirements. It will explain how enterprises and governmental agencies should employ a new generation of Cloud-based IdM solutions that can scale to meet today’s escalating IoT security requirements, and enable organizations to fulfill the promise of today’s connected world.

(more available)
Added: October 17, 2018
image from Building A Threat Intelligence Programme UK Edition

Building A Threat Intelligence Programme UK Edition

The report is based on research findings on the best practices and impacts of building a threat intelligence programme.

Added: October 17, 2018
image from Cyber Security in the Boardroom

Cyber Security in the Boardroom

The, NYSE Governance Services, in partnership with Veracode, surveyed nearly 200 directors of public companies representing a variety of industries—including financial services, technology, and health care—to discover how they view cybersecurity in the boardroom. Their goal was to gain insight into how cybersecurity is being understood, prioritized, and addressed at the board level.

(more available)
Added: October 17, 2018
image from CyberArk Global Advanced Threat Landscape Report 2018

CyberArk Global Advanced Threat Landscape Report 2018

According to the 11th annual CyberArk Global Advanced Threat Landscape Report, while organizations face diverse, dynamic and increasingly damaging cyber security threats, many remain hamstrung by inertia and uncertainty. This is the third and final installment of the 2018 report, which is the result of responses from 1,300 IT professionals, business leaders, application developers and DevOps practitioners from seven countries.

(more available)
Added: October 17, 2018
image from Internet Of Things Cybersecurity Readiness

Internet Of Things Cybersecurity Readiness

This report provides the results of a unique survey designed to analyze their IoT technologies and the struggles and challenges of providing and preparing for security issues related to thos devices.

(more available)
Added: October 17, 2018
image from Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

This report seeks to identify key components toward a framework to cyber risk modeling and qualifying and quantifying known vulnerabilities in defenses, while providing macro-systemic guidance.

(more available)
Added: October 17, 2018
image from Security Report:The Evolving Role of CISOs

Security Report:The Evolving Role of CISOs

This report presents the consolodiated global findings to better understand the nature of the CISO role and reveal insights, challenges, and approaches to security strategy in today’s global threat landscape.

(more available)
Added: October 17, 2018
image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
image from Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security

As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. This paper will discuss six of the top considerations.

(more available)
Added: October 17, 2018
image from "Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

"Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

This report takes a look at some of the problems in AI, and machine based cyber security, and seeks to show how they can be overcome.

(more available)
Added: October 16, 2018
image from Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

This paper seeks to show that data relating to the profiles of organizations and individuals subject to targeted attacks is amenable to study using epidemiological techniques. They design case-control studies to calculate odds ratios reflecting the degree of association between the identified risk factors and the receipt of targeted attack.

(more available)
Added: October 16, 2018
image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management.

(more available)
Added: October 16, 2018
image from The Cyber Readiness of Canadian Organizations

The Cyber Readiness of Canadian Organizations

The purpose of this research is to study how Canadian organizations are responding to cyber security threats and the need to invest in enabling security technologies.

(more available)
Added: October 16, 2018
image from The Evolution And Revolution Of The CISO

The Evolution And Revolution Of The CISO

This report explores both the incremental and transformational skills required for current and future CISO success, examining which fundamental technology and security capabilities matter most and which unexpected skills CISOs will need to acquire to help organizations reshape security to drive business success.

(more available)
Added: October 16, 2018
image from The Evolving State Of Network Security

The Evolving State Of Network Security

ProtectWise partnered with Osterman Research to interview more than 400 security analysts in the United States in order to uncover the state of network security today across organizations with 1,000 or more employees. The research looked at the biggest security challenges from the inside out, from staffing priorities to the need for specialized roles.

(more available)
Added: October 16, 2018
image from The Moral Component Of Cross Domain Conflict

The Moral Component Of Cross Domain Conflict

This is the final report of a study commissioned by the UK Ministry of Defence (MOD) through the Defence Human Capability Science and Technology Centre (DHCSTC) framework. The study was conducted over a period of six weeks and examines the academic debate pertaining to the moral landscape of conflict that spans different military domains (air, maritime, land, space, cyber). The investigation which is the subject of this report was commissioned by the Programme and Delivery Directorate of the Defence Science and Technology Laboratory (Dstl).

(more available)
Added: October 16, 2018
image from By the Numbers: Global Cyber Risk Perception Survey February 2018

By the Numbers: Global Cyber Risk Perception Survey February 2018

This is a unqiue report in that two leaders in two seperate industries collaborated out of the mutual concern regarding the state of cybersecurity in the global economy and the knowledge that cyber risk cannot be compartmentalized by industry, company,size, or simliar measures.

(more available)
Added: October 15, 2018
image from Cyber Security Considerations For Financial Institutions

Cyber Security Considerations For Financial Institutions

This paper discusses the issues that are caused by, “technology innovation and spearheaded by a generation that expects a seamless customer experience, the financial services landscape is undergoing fundamental change, which will no doubt influence the industry’s future cyber security considerations.”

(more available)
Added: October 15, 2018
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)