Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Spending

Below you will find reports with the tag of “Spending”

image from The CISO Report

The CISO Report

Business leaders’ bottom-line concerns often conflict with CISOs’ insistence on vital cybersecurity investments. The CISO-board relationship is deepening as they have more opportunities to engage on matters of cybersecurity and enterprise risk. CISOs’ regular presence in the boardroom and their counsel on enterprise risk will strengthen board confidence and alignment.

(more available)
Added: April 25, 2025
image from 2025 Global Digital Trust Insights Report

2025 Global Digital Trust Insights Report

PwC’s 2025 Global Digital Trust Insights revealed significant gaps companies must bridge before achieving cyber resilience. With the attack surface continuing to expand through advances in AI, connected devices and cloud technologies and the regulatory environment in constant flux, achieving cyber resilience at an enterprise level is critical. By addressing these gaps and making cybersecurity a business priority, executives can bridge to a more secure future.

(more available)
Added: January 16, 2025
image from The State of ASPM 2025

The State of ASPM 2025

This year’s findings provide a deeper look into the critical challenges and opportunities shaping application security as organizations grapple with growing attack surfaces, tool sprawl, and the rapid adoption of generative AI.

(more available)
Added: December 19, 2024
image from Permiso State of Identity Security Report 2024

Permiso State of Identity Security Report 2024

The Permiso Security State of Identity Security Report (2024) offers a comprehensive analysis of cloud identity and access management practices across global organizations. This study, encompassing over 500 entities, unveils critical trends and challenges shaping the future of identity security. 93% of organizations can inventory identities across all environments, as well as track keys, tokens, certificates and any modifications that are made to any environment.

(more available)
Added: November 9, 2024
image from The Offsec Shift Report

The Offsec Shift Report

The OffSec Shift Report reveals how organizations are adapting to bring both defensive and offensive strategies to the cybersecurity battle. The past year was hard on cybersecurity teams. The persistent economic downturn led to 39% of organizations deprioritizing their cybersecurity strategy.

(more available)
Added: October 30, 2024
image from State of the CISO 2023-2024 Report

State of the CISO 2023-2024 Report

This report presents the main findings with respect to the current state of CISOs. This duality became evident during our recent discussions with about 100 prominent CISOs from across the U.S. and Canada. The new SEC cyber rules and landmark cases that the agency brought against CISOs point to new legal and liability exposure.

(more available)
Added: September 13, 2024
image from 2024 Security Budget Report

2024 Security Budget Report

IANS and Artico Search conducted their fifth annual CISO Compensation and Budget Research Study. Our analysis of the key drivers behind security budget growth reveals significant increases are often triggered by incidents or breaches, or by rising risks such as those associated with AI adoption.

(more available)
Added: September 13, 2024
image from LevelBlue Futures  Report 2024

LevelBlue Futures Report 2024

With the advent and spread of powerful new technologies, businesses are under more pressure than ever to secure their organizations from the start of new computing developments. This report closely examines what executives are doing to protect their organizations and reveals what worries them about the tradeoffs between fostering innovation and lowering risk.

(more available)
Added: June 12, 2024
image from The State of Security Observation 2023

The State of Security Observation 2023

Security Observability is a technique of using logs, metrics, and traces to infer risk, monitor threats, and alert on breaches. It is a critical technique for security professionals to embrace. Security professionals use observation of system behavior to detect, understand, and stop new, unknown attacks. The Observe Data Lake approach gives customers the power they need to see how systems and people interact over time. Better security for less spend with Observe. We’ve been surveying the Observability field for years at Observe via our State of Observability Report, but this year is our first survey to focus on Security Observability. We talked to 500 security professionals to understand their current approach to security and how it’s intersecting with observability.

(more available)
Added: April 12, 2024
image from Hiscox Cyber Readiness Report 2021

Hiscox Cyber Readiness Report 2021

The Hiscox Cyber Readiness Report 2021 reveals that US firms are a global leader in cyber readiness, with more classified as ’cyber experts,’ (25%) compared to other countries. But there is still work to be done when it when it comes to dealing with ransomware and phishing emails, as US businesses are the most likely to pay a ransom. In this year’s report, we saw a disparity when it came to the level of cyber expertise US businesses have versus the actions they take when an attack actually occurs.

(more available)
Added: December 19, 2023
image from Cyber Readiness Report 2022

Cyber Readiness Report 2022

The Hiscox Cyber Readiness Report 2022 reveals that both the frequency and cost of cyber attacks are rising for US businesses, and the pandemic is continuing to have lasting effects on the cyber security landscape. While the US remains a global leader in cyber maturity, they are also most likely to pay a cyber-related ransom. To gauge businesses’ preparedness to combat cyber incidents and breaches, Hiscox surveyed over 5,000 professionals responsible for their company’s cyber security from the US, UK, Belgium, France, Germany, the Netherlands, Spain and Ireland. This includes key findings from over 900 professionals from the US.

(more available)
Added: December 19, 2023
image from The Ciso Report 2023

The Ciso Report 2023

Splunk sits at the heart of Security Operations for many of the world’s largest and most complex organizations. We spend our days helping CISOs and their teams get ahead of emerging threats, respond quickly when incidents inevitably occur, and succeed as business enablers. In The CISO Report, we share the results of our original research and offer insights on how leaders can evolve along with the cybersecurity landscape.

(more available)
Added: October 10, 2023
image from State of the CISO 2023

State of the CISO 2023

In this survey, we set out to discover how the digital-first economy has specifically impacted the role of the CISO/CSO. In addition to bringing awareness to the evolving role of the CISO, the survey strove to delve into the broader business ramifications of these changes, so organizations can better understand how digital initiatives are impacting risk and how companies can better protect themselves.

(more available)
Added: September 20, 2023
image from Network Security Trends in Hybrid Cloud Environments

Network Security Trends in Hybrid Cloud Environments

ESG conducted an in-depth survey of 255 cybersecurity and IT/information security professionals familiar with their organization’s network security tools and processes and responsible for evaluating, purchasing, and/or operating corporate network security controls across public cloud infrastructure and on-premises data centers/private cloud. Survey participants represented mid-market (500 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America (United States and Canada).

(more available)
Added: July 6, 2023
image from Managing Security Risk: Cybersecurity Solutions for Mid-Sized Businesses

Managing Security Risk: Cybersecurity Solutions for Mid-Sized Businesses

There is a new security reality facing mid-sized business leaders and security professionals today. In this guide, you’ll find answers to these challenges and how an MDR solution can help you efficiently maximize security investments and effectively manage security risks to your business.

(more available)
Added: June 28, 2023
image from Information Security Maturity Report 2023

Information Security Maturity Report 2023

This year, ClubCISO celebrates the release of its 10th Annual Security Maturity Report, conducted from an anonymous survey of 182 senior executives with responsibility for their organizations’ information security. The report outlines clear trends across the EMEA information security landscape, enabling businesses to benchmark their security investments against peer organizations. The report sheds some light on the current opportunities and challenges of today’s information security leaders.

(more available)
Added: June 19, 2023
image from The Invicti AppSec Indicator Fall 2022 Edition

The Invicti AppSec Indicator Fall 2022 Edition

In this latest edition of the Invicti AppSec Indicator, we asked development and security practitioners how they deal with all the excess AppSec noise in the face of relentless pressure to deliver business-critical software on time without compromising security.

(more available)
Added: May 11, 2023
image from 2023 Cloud Security Report

2023 Cloud Security Report

This 2023 Cloud Security Report surveyed 752 cybersecurity professionals to reveal key challenges and priorities. In 2023, the cloud is fundamentally delivering on its promised business outcomes, including flexible capacity and scalability, increased agility, improved availability, and accelerated deployment and provisioning.

(more available)
Added: May 3, 2023
image from The State of Security 2023

The State of Security 2023

Cyberattacks continue to grow in quantity and sophistication at the same time that organizations’ systems become increasingly complex. Security teams, as always, feel the stress. But a surprising outcome of our 2023 State of Security research is that the number of respondents who say they just can’t keep up has shrunk. Whether this data represents incremental improvement or a onetime windfall, organizations should press any advantage. Which won’t be easy: Most security teams tell us they’re too stuck in reactive mode to be effectively proactive.

(more available)
Added: April 25, 2023
image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report has been produced by Cybersecurity Insiders to explore how organizations are responding to the evolving security threats in the cloud and the continues shortfall of qualified security staff.

(more available)
Added: October 24, 2022
image from 2021 AWS Cloud Security Report

2021 AWS Cloud Security Report

The 2021 AWS Cloud Security Report is to uncover how AWS user organizations are responding to new security threats in the cloud, and what tools and best practices cybersecurity leaders are prioritizing in their move to the cloud. This year’s survey saw some significant changes in how organizations manage remediation of security and compliance issues with system owners.

(more available)
Added: October 18, 2022
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 08:08 UTC (build b1d7be4)