Below you will find reports with the tag of “Security standard” 2023 State of Security Report The 2023 State of Security Report surveyed over 240 cybersecurity professionals from North American to reveal the key challenges cybersecurity teams are facing, how they solve cyber issues, and the security technologies organizations prioritize. (more available) Added: January 23, 2023 The State of Supply Chain Defense In this years report, we’ll focus attention on how organizations are moving past problem identification and mitigating cyber risk challenges within supply chain vendors. (more available) Added: December 27, 2022 2021 Remote Workforce Security Report This Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available) Added: October 24, 2022 The State of Remote Work Security The State of Remote Work Security Report reveals the status of organizations’ efforts to secure the new workforce, key challenges, and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available) Added: October 24, 2022 2021 Application Security Report This report reveals that the expanded use of applications for business-critical applications, combined with the increased pace of application changes that come with DevOps methodologies, has created security challenges for organizations. (more available) Added: October 18, 2022 Managed Security Report 2022 The 2022 Managed Security Report reveals the latest trends and attitudes toward managed security, answering why organizations invest in security outsourcing, what challenges they are facing, and what requirements companies are prioritizing. (more available) Added: October 18, 2022 2022 AWS Cloud Security Report This report is based on comprehensive survey of 578 cybersecurity professionals to reveal how AWS user organizations are responding to evolving cloud security threats, and what tools and best practices cybersecurity leaders prioritize as their cloud infrastructures mature. (more available) Added: October 12, 2022 The State of Noncompliance in Cyber Risk Management The goal of this report is to offer a view on the state of compliance in today’s typical organization, including: the rate of noncompliance among a typical organization’s assets, the compliance standards that are hardest for organizations to adhere to, how well compliance tracks against the overall risk surface and the most common security controls causing non-compliance. (more available) Added: October 12, 2022 State of the Cybersecurity Attack Surface In our first State of the Cybersecurity Attack Surface report, we look at this issue, with data from visibility into more than 500,000 IT assets. (more available) Added: September 22, 2022 Annual Data Exposure Report 2022 Today, data is a company’s most valuable asset, leading many to invest in Insider Risk Management programs. Recent trends around employee turnover and remote work have created unprecedented challenges for security teams to protect valuable data from leaving the company. (more available) Added: June 8, 2022 The State of Pentesting 2022 The State of Pentesting 2022 Report focuses on issues and stats that are relevant to both security and development teams: to separate these two inextricably linked groups would only yield a partial picture of the security landscape. (more available) Added: May 4, 2022 State of Cybersecurity Automation Adoption A survey of 250 UK cybersecurity professionals on their perspectives of the state, benefits, and challenges in security process automation. Added: October 5, 2021 The Impact of the Solarwinds Breach on Cybersecurity A survey of 200 global security professionals as to their opinions, responses, and outlook of the Solarwinds software chain compromise. Added: March 14, 2021 Cloud Impact Study Part 2: The Security and Compliance Barricade Part 2 of The Cloud Impact Study looks at the importance of security as a significant driver for cloud transformation, as well as how security and data protection concerns present a challenge that acts as the primary barrier to cloud transformation. (more available) Added: February 22, 2021 The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom A survey of over 1,000 US and UK IT professionals on the challenges to having the necessary in-house expertise to achieve a strong cybersecurity posture. (more available) Added: September 3, 2020 Survey Report: Evolution of the CASB A survey-driven report of over 200 IT and security professionals on the practices and the objectives in their use of cloud access security broker (CASB) technologies. (more available) Added: August 21, 2020 Implementing Cloud Security Best Practices This report covers findings from a survey conducted by Dimensional Research in July 2020. A total of 310 qualified individuals completed the survey. (more available) Added: August 17, 2020 Global Cybersecurity Index & Cyberwellness Profiles The initial global cybersecurity index report. Using a survey based approach, this report attempts to create a global index for the state of cybersecurity and establish country specific wellness profiles. (more available) Added: August 3, 2020 Consumer Attitudes Toward Data Privacy Survey, 2018 This report by Akamai, sought to find out how much consumers trust companies. The study found that American consumers are very forgiving with companies that have access to their personal information. (more available) Added: June 29, 2020 The Path from Reactive to Proactive Third-Party Risk Management Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns. (more available) Added: June 22, 2020 2020 Global State of Least Privilege Cyber Security Applying the principle of least privilege should be a foundational element of any organization’s cyber security strategy. However, a sustainable least privilege strategy isn’t something that can be set up overnight. (more available) Added: May 8, 2020 «« « 1 2 3 4 5 » »»
2023 State of Security Report The 2023 State of Security Report surveyed over 240 cybersecurity professionals from North American to reveal the key challenges cybersecurity teams are facing, how they solve cyber issues, and the security technologies organizations prioritize. (more available) Added: January 23, 2023
The State of Supply Chain Defense In this years report, we’ll focus attention on how organizations are moving past problem identification and mitigating cyber risk challenges within supply chain vendors. (more available) Added: December 27, 2022
2021 Remote Workforce Security Report This Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available) Added: October 24, 2022
The State of Remote Work Security The State of Remote Work Security Report reveals the status of organizations’ efforts to secure the new workforce, key challenges, and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available) Added: October 24, 2022
2021 Application Security Report This report reveals that the expanded use of applications for business-critical applications, combined with the increased pace of application changes that come with DevOps methodologies, has created security challenges for organizations. (more available) Added: October 18, 2022
Managed Security Report 2022 The 2022 Managed Security Report reveals the latest trends and attitudes toward managed security, answering why organizations invest in security outsourcing, what challenges they are facing, and what requirements companies are prioritizing. (more available) Added: October 18, 2022
2022 AWS Cloud Security Report This report is based on comprehensive survey of 578 cybersecurity professionals to reveal how AWS user organizations are responding to evolving cloud security threats, and what tools and best practices cybersecurity leaders prioritize as their cloud infrastructures mature. (more available) Added: October 12, 2022
The State of Noncompliance in Cyber Risk Management The goal of this report is to offer a view on the state of compliance in today’s typical organization, including: the rate of noncompliance among a typical organization’s assets, the compliance standards that are hardest for organizations to adhere to, how well compliance tracks against the overall risk surface and the most common security controls causing non-compliance. (more available) Added: October 12, 2022
State of the Cybersecurity Attack Surface In our first State of the Cybersecurity Attack Surface report, we look at this issue, with data from visibility into more than 500,000 IT assets. (more available) Added: September 22, 2022
Annual Data Exposure Report 2022 Today, data is a company’s most valuable asset, leading many to invest in Insider Risk Management programs. Recent trends around employee turnover and remote work have created unprecedented challenges for security teams to protect valuable data from leaving the company. (more available) Added: June 8, 2022
The State of Pentesting 2022 The State of Pentesting 2022 Report focuses on issues and stats that are relevant to both security and development teams: to separate these two inextricably linked groups would only yield a partial picture of the security landscape. (more available) Added: May 4, 2022
State of Cybersecurity Automation Adoption A survey of 250 UK cybersecurity professionals on their perspectives of the state, benefits, and challenges in security process automation. Added: October 5, 2021
The Impact of the Solarwinds Breach on Cybersecurity A survey of 200 global security professionals as to their opinions, responses, and outlook of the Solarwinds software chain compromise. Added: March 14, 2021
Cloud Impact Study Part 2: The Security and Compliance Barricade Part 2 of The Cloud Impact Study looks at the importance of security as a significant driver for cloud transformation, as well as how security and data protection concerns present a challenge that acts as the primary barrier to cloud transformation. (more available) Added: February 22, 2021
The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom A survey of over 1,000 US and UK IT professionals on the challenges to having the necessary in-house expertise to achieve a strong cybersecurity posture. (more available) Added: September 3, 2020
Survey Report: Evolution of the CASB A survey-driven report of over 200 IT and security professionals on the practices and the objectives in their use of cloud access security broker (CASB) technologies. (more available) Added: August 21, 2020
Implementing Cloud Security Best Practices This report covers findings from a survey conducted by Dimensional Research in July 2020. A total of 310 qualified individuals completed the survey. (more available) Added: August 17, 2020
Global Cybersecurity Index & Cyberwellness Profiles The initial global cybersecurity index report. Using a survey based approach, this report attempts to create a global index for the state of cybersecurity and establish country specific wellness profiles. (more available) Added: August 3, 2020
Consumer Attitudes Toward Data Privacy Survey, 2018 This report by Akamai, sought to find out how much consumers trust companies. The study found that American consumers are very forgiving with companies that have access to their personal information. (more available) Added: June 29, 2020
The Path from Reactive to Proactive Third-Party Risk Management Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns. (more available) Added: June 22, 2020
2020 Global State of Least Privilege Cyber Security Applying the principle of least privilege should be a foundational element of any organization’s cyber security strategy. However, a sustainable least privilege strategy isn’t something that can be set up overnight. (more available) Added: May 8, 2020