Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Planning

Below you will find reports with the tag of “Planning”

image from Building Trust In The Cloud: Overcoming Cybersecurity Concerns To Reap Cloud's Benefits

Building Trust In The Cloud: Overcoming Cybersecurity Concerns To Reap Cloud's Benefits

The HIMSS Media survey, Cloud Security Insights, sponsored by the Center for Connected Medicine, sought to better understand attitudes and perceptions about cloud security among hospitals and health systems. It’s findings: among the IT, cybersecurity and informatics professionals surveyed, more than half cited cybersecurity concerns as “significantly limiting” their use of cloud services.

(more available)
Added: March 1, 2019
image from Pen Test Metrics 2018

Pen Test Metrics 2018

Here at Cobalt, we’ve done over 350 penetration tests to date. The information included in this report (Time to Fix, Vulnerability Types, Findings Criticality, Issues Fixed) is summary data from all of the penetration tests performed in 2017. Additionally, we provide survey data (Portfolio Coverage, Pen Test Frequency) from 75 respondents in security, management, operations, DevOps, product, and developer roles. All data has been anonymized to protect the privacy of our contributors.

(more available)
Added: February 18, 2019
image from The 2017 State Of The Firewall

The 2017 State Of The Firewall

FireMon is proud to present its 3rd Annual State of the Firewall Report based on 437 survey responses collected between November 16, 2016 and December 6, 2016. Respondents included IT security practitioners representing a range of professional roles, organization sizes and industry verticals. Survey participants were asked 26 questions about their current firewall infrastructure and management challenges as well as questions about adoption and impact of emerging technologies such as SDN, cloud, microsegmentation and Internet of Things (IoT).

(more available)
Added: February 18, 2019
image from 2018 Application Security Report

2018 Application Security Report

From the report, “Business applications are critical business resources for companies of all sizes — and they’re increasingly under attack. To gain deeper insights into the state of application security, Cybersecurity Insiders conducted an in-depth study in partnership with the 400,000 member Information Security Community on LinkedIn. This report is the result of a comprehensive survey of 437 cybersecurity professionals designed to reveal the latest application security trends, how organizations are protecting applications, and what tools and best practices IT cybersecurity teams are prioritizing to find, fix and prevent vulnerabilities in next-gen applications.”

(more available)
Added: February 18, 2019
image from Take Control Of Vendor Risk Management Through Continuous Monitoring

Take Control Of Vendor Risk Management Through Continuous Monitoring

This survey, conducted by Forrester Consulting on behalf of BitSight, offers insight in to the critical role that Vendors play in key business functions and how they can create security risks and issues.

(more available)
Added: February 17, 2019
image from Lloyd's City Risk Index: Middle East and Africa

Lloyd's City Risk Index: Middle East and Africa

This paper provides the Middle East and African insights from the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Lloyd's City Risk Index: Latin America

Lloyd's City Risk Index: Latin America

This is the Latin American focussed section of the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Lloyd's City Risk Index: Asia Pacific

Lloyd's City Risk Index: Asia Pacific

This report provides the Asia Pacific focussed section of the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Lloyds City Risk Index: Europe

Lloyds City Risk Index: Europe

This report summarizes Lloyd’s City Risk Index report for the cities of Europe.

Added: February 13, 2019
image from The Future Is Now: Q1 2018 Fraud Trends Report

The Future Is Now: Q1 2018 Fraud Trends Report

From the report, “This report shares Feedzai’s original research. We found that fraudsters are attacking in methods that are faster and faster – and continuously new. The time horizon for the future of fraud has been shrinking. Today, the time horizon has shrunk to now. What does this new now look like?” Read on to find out more.

(more available)
Added: February 13, 2019
image from The Dawn Of Machine Learning For Banking And Payments

The Dawn Of Machine Learning For Banking And Payments

From the report, “The advent of big data happened to coincide with the advent of better computing, better algorithms, and new AI-focused organizations, allowing us to take this data and turn it into something even better: meaning. This brings us to machine learning. Later in this guide, we’ll look at how machine learning works and how it can work for you. But first, let’s take a closer look at all the ingredients that got us here.” Read on to learn more.

(more available)
Added: February 13, 2019
image from 2018 Application Security Report

2018 Application Security Report

This report is based on the results of a comprehensive online survey of 437 cybersecurity professionals conducted from June through August 2018 to gain deep insights into the latest application security threats faced by organizations and the solutions to prevent and remediate them. The respondents range from executives to managers and IT security practitioners. They represent organizations of varying sizes across many industries.

(more available)
Added: February 12, 2019
image from The Cyber Resilience of Canadian Organizations

The Cyber Resilience of Canadian Organizations

Scalar’s study of the cyber resilience of Canadian organizations finds there is a new normal across the threat landscape. Cyber security incidents – whether they be exfiltration, infiltration, or denial of service – are now occurring on a regular basis. To address this, the focus of cyber security efforts is shifting from an emphasis on protection against attacks, to improving the detection of malicious actors on the network, and responding to and recovering from incidents as quickly as possible. The findings of the 2019 Scalar Security Study reflect on these new trends and introduce cyber resilience as a security theme that emphasizes the importance of business continuity and the need for organizations to return to normal operations and a trusted state after an incident has occurred

(more available)
Added: February 9, 2019
image from Predictions 2019

Predictions 2019

As the end of 2018 approaches and the last year of the decade dawns, the challenges faced by cyber security teams are a blend of “more of the same” and “let’s change the approach”.

(more available)
Added: February 9, 2019
image from Splunk 2018 Predictions

Splunk 2018 Predictions

At Splunk, our experts don’t read palms, but they do look into the future. The future of artificial intelligence (AI) and machine learning (ML), IT operations, security, and IoT. Join us once again as we connect with our renowned experts to capture their predictions for the next big thing in their fields.

(more available)
Added: February 9, 2019
image from Security Budgets 2019: The Year Of Services Arrives

Security Budgets 2019: The Year Of Services Arrives

From the report, “This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use these budget ranges as a starting point to evaluate their own programs, then compare their product, service, staffing, and other allocations with those of similar firms.” Read on to find out more.

(more available)
Added: February 8, 2019
image from Enterprise Cyber Awareness and Simulation Training Guide

Enterprise Cyber Awareness and Simulation Training Guide

“The people, not just tools, are the key to enterprise cyber security. It’s time to devise an actionable plan to make sure every member of your organization is cyber-ready. In this guide, we will present a basic framework for optimizing the types, frequency and costs of security simulation training for the entire enterprise.”

(more available)
Added: February 8, 2019
image from A CISO's Guide to Cloud Security

A CISO's Guide to Cloud Security

This guide provides some important considerations to keep in mind when investigating a cloud security platform that can address today’s realities and tomorrow’s cloud-first or cloud only end goals.

(more available)
Added: February 6, 2019
image from UK Active Cyber Defence

UK Active Cyber Defence

The key findings of this report are; 1) Active Cyber defence has significant potential in helping improve UK national cybersecurity 2) Active Cyber defence can play a powerful role in shaping the cybersecurity marketplace and furthering the interests of UK internet users and consumers 3) Active Cyber defense is a potentially useful model for export to like-minded countries 4) Active Cyber defense may constitute an emergent public good 5)Active cyber defense is not perfect, nor should we expect it to be.

(more available)
Added: January 31, 2019
image from The State Of IOT Security

The State Of IOT Security

This report offers the following taglines - IoT device breaches undetectable by nearly half of companies, and use of blockchain technology to help secure IoT data, devices and services doubles in a year.

(more available)
Added: January 30, 2019
image from State Of IOT Security: Infographic

State Of IOT Security: Infographic

This Infographic offers a brief presentation of the data presented in the Gemalto 2018 State of IOT Security.

Added: January 30, 2019
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)