Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security standard

Below you will find reports with the tag of “Security standard”

image from 2023 State of Security Report

2023 State of Security Report

The 2023 State of Security Report surveyed over 240 cybersecurity professionals from North American to reveal the key challenges cybersecurity teams are facing, how they solve cyber issues, and the security technologies organizations prioritize. (more available)
Added: January 23, 2023
image from The State of Supply Chain Defense

The State of Supply Chain Defense

In this years report, we’ll focus attention on how organizations are moving past problem identification and mitigating cyber risk challenges within supply chain vendors. (more available)
Added: December 27, 2022
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

This Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available)
Added: October 24, 2022
image from The State of Remote Work Security

The State of Remote Work Security

The State of Remote Work Security Report reveals the status of organizations’ efforts to secure the new workforce, key challenges, and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available)
Added: October 24, 2022
image from 2021 Application Security Report

2021 Application Security Report

This report reveals that the expanded use of applications for business-critical applications, combined with the increased pace of application changes that come with DevOps methodologies, has created security challenges for organizations. (more available)
Added: October 18, 2022
image from Managed Security Report 2022

Managed Security Report 2022

The 2022 Managed Security Report reveals the latest trends and attitudes toward managed security, answering why organizations invest in security outsourcing, what challenges they are facing, and what requirements companies are prioritizing. (more available)
Added: October 18, 2022
image from 2022 AWS Cloud Security Report

2022 AWS Cloud Security Report

This report is based on comprehensive survey of 578 cybersecurity professionals to reveal how AWS user organizations are responding to evolving cloud security threats, and what tools and best practices cybersecurity leaders prioritize as their cloud infrastructures mature. (more available)
Added: October 12, 2022
image from The State of Noncompliance in Cyber Risk Management

The State of Noncompliance in Cyber Risk Management

The goal of this report is to offer a view on the state of compliance in today’s typical organization, including: the rate of noncompliance among a typical organization’s assets, the compliance standards that are hardest for organizations to adhere to, how well compliance tracks against the overall risk surface and the most common security controls causing non-compliance. (more available)
Added: October 12, 2022
image from State of the Cybersecurity Attack Surface

State of the Cybersecurity Attack Surface

In our first State of the Cybersecurity Attack Surface report, we look at this issue, with data from visibility into more than 500,000 IT assets. (more available)
Added: September 22, 2022
image from Annual Data Exposure Report 2022

Annual Data Exposure Report 2022

Today, data is a company’s most valuable asset, leading many to invest in Insider Risk Management programs. Recent trends around employee turnover and remote work have created unprecedented challenges for security teams to protect valuable data from leaving the company. (more available)
Added: June 8, 2022
image from The State of Pentesting 2022

The State of Pentesting 2022

The State of Pentesting 2022 Report focuses on issues and stats that are relevant to both security and development teams: to separate these two inextricably linked groups would only yield a partial picture of the security landscape. (more available)
Added: May 4, 2022
image from State of Cybersecurity Automation Adoption

State of Cybersecurity Automation Adoption

A survey of 250 UK cybersecurity professionals on their perspectives of the state, benefits, and challenges in security process automation.
Added: October 5, 2021
image from The Impact of the Solarwinds Breach on Cybersecurity

The Impact of the Solarwinds Breach on Cybersecurity

A survey of 200 global security professionals as to their opinions, responses, and outlook of the Solarwinds software chain compromise.
Added: March 14, 2021
image from Cloud Impact Study Part 2: The Security and Compliance Barricade

Cloud Impact Study Part 2: The Security and Compliance Barricade

Part 2 of The Cloud Impact Study looks at the importance of security as a significant driver for cloud transformation, as well as how security and data protection concerns present a challenge that acts as the primary barrier to cloud transformation. (more available)
Added: February 22, 2021
image from The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

A survey of over 1,000 US and UK IT professionals on the challenges to having the necessary in-house expertise to achieve a strong cybersecurity posture. (more available)
Added: September 3, 2020
image from Survey Report: Evolution of the CASB

Survey Report: Evolution of the CASB

A survey-driven report of over 200 IT and security professionals on the practices and the objectives in their use of cloud access security broker (CASB) technologies. (more available)
Added: August 21, 2020
image from Implementing Cloud Security Best Practices

Implementing Cloud Security Best Practices

This report covers findings from a survey conducted by Dimensional Research in July 2020. A total of 310 qualified individuals completed the survey. (more available)
Added: August 17, 2020
image from Global Cybersecurity Index & Cyberwellness Profiles

Global Cybersecurity Index & Cyberwellness Profiles

The initial global cybersecurity index report. Using a survey based approach, this report attempts to create a global index for the state of cybersecurity and establish country specific wellness profiles. (more available)
Added: August 3, 2020
image from Consumer Attitudes Toward Data Privacy Survey, 2018

Consumer Attitudes Toward Data Privacy Survey, 2018

This report by Akamai, sought to find out how much consumers trust companies. The study found that American consumers are very forgiving with companies that have access to their personal information. (more available)
Added: June 29, 2020
image from The Path from Reactive to Proactive Third-Party Risk Management

The Path from Reactive to Proactive Third-Party Risk Management

Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns. (more available)
Added: June 22, 2020
image from 2020 Global State of Least Privilege Cyber Security

2020 Global State of Least Privilege Cyber Security

Applying the principle of least privilege should be a foundational element of any organization’s cyber security strategy. However, a sustainable least privilege strategy isn’t something that can be set up overnight. (more available)
Added: May 8, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)