Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security training

Below you will find reports with the tag of “Security training”

image from Global Cybersecurity Index & Cyberwellness Profiles

Global Cybersecurity Index & Cyberwellness Profiles

The initial global cybersecurity index report. Using a survey based approach, this report attempts to create a global index for the state of cybersecurity and establish country specific wellness profiles. (more available)
Added: August 3, 2020
image from Opportunity in Cybersecurity Research Report 2020

Opportunity in Cybersecurity Research Report 2020

This report outlines job opportunity in the cybersecurity industry. It reveals that the workforce needs to grow dramatically to meet the current demand, that there is a skills gap, and more. (more available)
Added: July 31, 2020
image from Cyber security skills in the UK labour market

Cyber security skills in the UK labour market

A review of the cybersecurity job market in the UK, the nature and extent of skill gaps and shortages. A combination of surveys, qualitative research with firms, and a review of job postings. (more available)
Added: July 27, 2020
image from Cyber Pulse: The State of Cybersecurity in Healthcare- Part Two

Cyber Pulse: The State of Cybersecurity in Healthcare- Part Two

To have a better understanding of where the healthcare industry stands in their knowledge of cybersecurity, Kaspersky commissioned a survey to gauge the perceptions of healthcare employees in North America with regard to cybersecurity in the workplace. (more available)
Added: June 29, 2020
image from 2020 Cloud Security Report

2020 Cloud Security Report

The Cloud Security Report is an annual paper published by ISC(2). It goes in depth on the changing cloud environment as companies continue to rapidly migrate workloads from data centers to the cloud. (more available)
Added: June 25, 2020
image from DevSecOps Community Survey 2020

DevSecOps Community Survey 2020

The seventh annual survey from Sonatype covers the differences between mature and immature DevOps practices. Special focuses on developer satisfaction, security policy adherence, and security investments. (more available)
Added: June 12, 2020
image from Cyber Business Executive Reserarch: Security Leadership Talent Gap

Cyber Business Executive Reserarch: Security Leadership Talent Gap

This report seeks to provide actionable insight and practical advice to help organizations increase talent-gap resilience and avoid being left behind as the industry evolves. (more available)
Added: May 19, 2020
image from Impact Report 2020

Impact Report 2020

As software proliferates and DevOps takes hold, we conducted this study to understand the impact of utilizing Pentest as a Service (PtaaS) vs. (more available)
Added: May 11, 2020
image from The CISO Current Report

The CISO Current Report

This document institutes the third edition of the CISO Current report and contains data gathered from direct interviews surveying almost 40 cybersecurity executives at leading enterprises. (more available)
Added: May 8, 2020
image from 2020 Cyberthreat Defense Report

2020 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great job of collecting statistics on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad actors. (more available)
Added: May 8, 2020
image from 2020 User Risk Report: Exploring Vulnerability and Behavior in a People-Centric Threat Landscape

2020 User Risk Report: Exploring Vulnerability and Behavior in a People-Centric Threat Landscape

This survey of 3500 people (conducted by a 3rd party survey research company) examines attitudes and knowledge of various security concepts. (more available)
Added: May 6, 2020
image from 2020 State of the Phish

2020 State of the Phish

Our sixth annual State of the Phish report again brings you critical, actionable insights into the current state of the phishing threat. (more available)
Added: March 29, 2020
image from 2017 Survey Results Cybersecurity: Can Overconfidence Lead to an Extinction Event?

2017 Survey Results Cybersecurity: Can Overconfidence Lead to an Extinction Event?

In early 2017, SolarWinds MSP investigated the cybersecurity preparedness, experiences, and failings of 400 SMBs and enterprises, split equally across the UK and the US. (more available)
Added: February 18, 2020
image from Analysis: Pricing of Goods and Services on the Deep & Dark Web

Analysis: Pricing of Goods and Services on the Deep & Dark Web

The survey results and relevant observations are as follows: The inner workings of this underground economy havecome to play an influential role in many of the cyberand physical risks facing organizations today. (more available)
Added: February 18, 2020
image from Cofense Annual Phishing Report 2019

Cofense Annual Phishing Report 2019

Cofence report on how phishing attempts and phishing prevention have changed in 2019.
Added: February 9, 2020
image from AppSec Trend Report

AppSec Trend Report

A report by DZone showing trends in the changing AppSec industry.
Added: December 2, 2019
image from 2020 Cyber Trendscape report

2020 Cyber Trendscape report

The goal of this initiative was to identify trends impacting cyber security decisions, the top cyber security priorities for 2020 and beyond, the focus of risk mitigation strategies, and to highlight the overall beliefs and perceptions held by senior executives regarding the state of the cyber threat landscape and how the cyber security industry, governments and regulatory agencies are responding to their needs. (more available)
Added: November 25, 2019
image from Strategies for Building and Growing Strong Cybersecurity Teams

Strategies for Building and Growing Strong Cybersecurity Teams

This report explores the results of the 2019 (ISC)² Cybersecurity Workforce Study, providing details on the cybersecurity workforce and gap estimates, taking a closer look at cybersecurity professionals and their teams, reviewing key steps on the cybersecurity career path, and discussing insights into immediate and longer-term methods for building qualified and resilient cybersecurity teams now and in the future. (more available)
Added: November 25, 2019
image from Cloud Security Report

Cloud Security Report

A survey based report on the attitudes and beliefs of security professionals to the challenges and opportunities in cloud security.
Added: October 1, 2019
image from Beyond The Phish

Beyond The Phish

This report seeks to explore user knowledge of a broad range of best practices for cyber hygiene, security and compliance.
Added: September 18, 2019
image from The Cybersecurity Imperative: Pulse Update - Summer 2019

The Cybersecurity Imperative: Pulse Update - Summer 2019

In 2018, WSJ Pro Cybersecurity partnered with ESI ThoughtLab, a thought leadership and economic research firm, to gather data on how more than 1,300 enterprises were responding to the challenge of managing cyber risk. (more available)
Added: September 18, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 6
  • »
  • »»
© Cyentia Institute 2022
Library updated: June 30, 2022 20:09 UTC (build d6199b1)