Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Planning

Below you will find reports with the tag of “Planning”

image from State of API Security Q3 2022

State of API Security Q3 2022

The State of API Security Report from Salt Labs is the industry’s only report on API security risks, challenges, and strategies. The Q3 2022 report incorporates survey results and empirical data from the Salt SaaS platform hosting our customers’ API metadata. The most eye-opening findings from the report comes from our customers. Over the past year, Salt customers experienced a 117% increase in API attack traffic while their overall API traffic grew 168%.

(more available)
Added: September 15, 2022
image from 2022 The State of Risk Oversight

2022 The State of Risk Oversight

This report summarizes our findings and provides a resource for benchmarking an organization’s approach to risk oversight against current practices. In addition to highlighting key findings for the full sample of 560 respondents, we also separately report many of the key findings for the following subgroups of respondents: 152 large organizations (those with revenues greater than $1 billion), 129 publicly traded companies, 151 financial services entities and 156 not-for-profit organizations.

(more available)
Added: September 6, 2022
image from 2022 State of the Cloud Report

2022 State of the Cloud Report

The eleventh annual Flexera 2022 State of the Cloud Report (previously known as the RightScale State of the Cloud Report) explores the thinking of 753 respondents from a survey conducted in late 2021. It highlighted year-over-year (YoY) changes to help identify trends. The respondents global cloud decision-makers and users-revealed their experiences and insights about the public, private and multi-cloud market.

(more available)
Added: August 2, 2022
image from 2022 State of Startup Security

2022 State of Startup Security

When it comes to security, there is a paradox. Security can enable businesses to scale and grow, but confusion around security and overly rigid practices can introduce unnecessary red tape. Our survey reveals that startups struggle to find the balance between managing risks and prioritizing security.

(more available)
Added: July 14, 2022
image from The state of industrial security in 2022

The state of industrial security in 2022

This report takes an in-depth look at lloT/OT security projects, implementation challenges, security incidents, technology investments, and a variety of issues related to cybersecurity risks.

(more available)
Added: July 12, 2022
image from The State of Cybersecurity 2022 Trends

The State of Cybersecurity 2022 Trends

Arctic Wolf’s 2022 Security Trends Report provides insight into the current and future state of these cybersecurity teams as they attempt to move their security programs forward while dealing with an ever-evolving threat environment. Our research findings show that ransomware, phishing and vulnerabilities don’t just monopolize headlines, they’re taking up security professionals’ headspace, too. Defending an increasing number of threats from attackers with far more resources feels like a lost cause too many businesses.

(more available)
Added: June 10, 2022
image from Quantum Dawn VI After-Action Report

Quantum Dawn VI After-Action Report

The intent of the exercise was to assess public and private sector-wide communications and information-sharing mechanisms, crisis management protocols, and decision-making, as well as legal and regulatory considerations as exercise participants responded to and recovered from significant ransomeware attacks targeting the financial sector. The scenario emphasized global cross-jurisdiction information sharing among financial firms, central banks, regulatory authorities, trade associations and information-sharing organizations.

(more available)
Added: May 31, 2022
image from 2021 State of the Software Supply Chain

2021 State of the Software Supply Chain

Now in its seventh year, Sonatype’s 2021 State of the Software Supply Chain Report blends a broad set of public and proprietary data to reveal important findings about open source and its increasingly important role in digital innovation.

(more available)
Added: May 19, 2022
image from CrimeWare Report 2021: Post-Mortem Analysis of a Dumpster Fire

CrimeWare Report 2021: Post-Mortem Analysis of a Dumpster Fire

For many cybersecurity community, the past several months have been a dumpster fire. We’ve analyzed and tracked definitive data from more than 1,500 incident response and forensic cases over 12 months to provide unique visibility into the state of ransomware.

(more available)
Added: May 17, 2022
image from Cloud Automation is the Key to Future-Proofing Cybersecurity

Cloud Automation is the Key to Future-Proofing Cybersecurity

This report reveals the challenges we face as a security industry and points towards a balanced path of expertise and automation to guide our work.

(more available)
Added: April 14, 2022
image from The Power of Purple Teaming

The Power of Purple Teaming

PlexTrac sponsored research with CyberRisk Alliance to better understand how cybersecurity teams are using emerging strategies like adversary emulation and purple teaming to combat growing ransomware threats. This report details the findings of a survey of 315 IT and cybersecurity decision-makers and influencers.

(more available)
Added: February 9, 2022
image from Cyber Security in Focus 2022

Cyber Security in Focus 2022

An annual state of the market report, which explores the views of a snapshot cohort of 55 security leaders on key themes, including; the skills shortage, barriers to strategy execution, the business perception of cyber security, and more.

(more available)
Added: January 20, 2022
image from Executive Perspectives on Top Risks for 2021 & 2030

Executive Perspectives on Top Risks for 2021 & 2030

This report is based on an annual survey of boards of directors and C-suite executives about risks on the horizon for the upcoming year. It highlights top risks of immediate concern on the minds of executives for this year - 2021 - and for the long-term - 2030.

(more available)
Added: January 7, 2022
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

Drawing on Duo’s customer basis of millions of devices and the authentication traffic associated with them between June 2020 and May 2021, this report reviews trends in authentication methods and includes firmographic breakdowns.

(more available)
Added: October 17, 2021
image from State of Cybersecurity Automation Adoption

State of Cybersecurity Automation Adoption

A survey of 250 UK cybersecurity professionals on their perspectives of the state, benefits, and challenges in security process automation.

(more available)
Added: October 5, 2021
image from From Uncertainty to Understanding

From Uncertainty to Understanding

Using RiskRecon’s assessment information, explanatory models are built to demonstrate the value of technical information in predicting measures of risk at varying levels of greater technical insight.

(more available)
Added: May 11, 2021
image from The 2021 Security Outcomes Study – Small and Midsize Business Edition

The 2021 Security Outcomes Study – Small and Midsize Business Edition

What makes for successful cybersecurity? Is there evidence that security investments result in measurable outcomes? How do we know what actually works and what doesn’t? These are the types of burning questions guiding Cisco’s 2021 Security Outcomes Study, which pulls together the experiences of over 4,800 IT, security, and privacy professionals around the world. This document is an offshoot of the larger study that focuses on small and midsize businesses (SMBs). Discover how SMBs compare to larger enterprises when it comes to security, and what key factors contributed to successful security planning in companies like yours.

(more available)
Added: April 19, 2021
image from How IT Security Leaders Can Unlock the Potential of Their Teams

How IT Security Leaders Can Unlock the Potential of Their Teams

This report looks at IT security teams. They highlight changes in the teams and the ways that they work.

Added: February 28, 2021
image from Securing a Shifting Landscape: Corporate perceptions of nation-state cyber-threats

Securing a Shifting Landscape: Corporate perceptions of nation-state cyber-threats

This report assesses corporate perceptions of nation-state cyber-threats. It finds that companies have become more aware of the challenges posed by such threats and are concerned about them; however, their ability to respond to evolving risks may be lacking.

(more available)
Added: February 24, 2021
image from Aptum Cloud Impact Study Part 1: Bridging the Cloud Transformation Gap

Aptum Cloud Impact Study Part 1: Bridging the Cloud Transformation Gap

Part 1 of the Cloud Impact Study reveals that businesses understand the importance of the cloud and strive to adopt this model. It goes into several key barriers stopping businesses from utilizing the cloud’s potential.

(more available)
Added: February 22, 2021
image from Cloud Impact Study Part 2: The Security and Compliance Barricade

Cloud Impact Study Part 2: The Security and Compliance Barricade

Part 2 of The Cloud Impact Study looks at the importance of security as a significant driver for cloud transformation, as well as how security and data protection concerns present a challenge that acts as the primary barrier to cloud transformation. This report explores how cloud computing can bolster the overall security of an organization, but as deployments become more complicated, so too does data governance and security.

(more available)
Added: February 22, 2021
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)