Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Staffing

Below you will find reports with the tag of “Staffing”

image from Deepwatch SecOps Pulse Survey Q4 2022

Deepwatch SecOps Pulse Survey Q4 2022

The Deepwatch SecOps Pulse Survey research shows that security teams are more focused on improving response capabilities over detection improvements. This speaks to rising threats and an expanding attack surface that makes attacks nearly inevitable, forcing teams to prioritize limited resources.

(more available)
Added: December 22, 2022
image from 2021 Threat Hunting Report

2021 Threat Hunting Report

In 2021, Cybersecurity Insiders conducted the fourth annual threat hunting research project to gain deeper insights into the maturity and evolution of the security practice. While many SOCs are struggling to cope with the current security threat workload, more organizations are adopting threat hunting as part of their security operations. They are discovering that proactive threat hunting can reduce the risk and impact of threats while improving defenses against new attacks.

(more available)
Added: October 24, 2022
image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report has been produced by Cybersecurity Insiders to explore how organizations are responding to the evolving security threats in the cloud and the continues shortfall of qualified security staff.

(more available)
Added: October 24, 2022
image from 2021 SOAR Report

2021 SOAR Report

The 2021 SOAR Report is based on a comprehensive survey of cybersecurity professionals to uncover the latest trends, use cases, and benefits of SOAR solutions.

(more available)
Added: October 24, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

(more available)
Added: October 18, 2022
image from The State of MITRE ATT&CK Threat-Informed Defense

The State of MITRE ATT&CK Threat-Informed Defense

Cyber adversaries and threats are becoming increasingly sophisticated and more frequent. The survey of 297 IT security professionals found that although 82 percent of respondents said they know about the MITRE ATT&CK framework, only 8 percent reported that they are using the ATT&CK framework regularly.

(more available)
Added: September 21, 2022
image from The GitLab 2022 Global DevSecOps Survey

The GitLab 2022 Global DevSecOps Survey

In May 2022, over 5,000 DevOps professionals shared details about their teams and practices. Despite a challenging business environment, strong momentum continued in automation, release cadences, and cutting-edge technology adoption. Secure software development is now an imperative for DevOps teams around the world. It’s the number one reason for - and benefits of - DevOps platform usage.

(more available)
Added: September 20, 2022
image from Women in Cybersecurity

Women in Cybersecurity

The new look at the workforce revealed that the percentage of women in cybersecurity is roughly 24%. While men continue to outnumber women in cybersecurity and pay disparity still exists, women in the field are buoyed by higher levels of education, and are finding their way to leadership positions in higher numbers.

(more available)
Added: September 6, 2022
image from AI and automation for cybersecurity

AI and automation for cybersecurity

In this report, we show how this combination of AI and automation can deliver substantially better performance, whether in the form of speed, insights, or flexibility. These performance improvements enable cybersecurity teams to shift their focus to what really matters: proactively protecting against, detecting, responding to, and recovering from threats while reducing costs and complexity.

(more available)
Added: July 18, 2022
image from 2022 XDR Report

2022 XDR Report

Evolving security threats, exponential data growth, increased complexity, and a continuing cybersecurity shill shortage has given rise to a new category of security solutions called Extended Detection and Response (XDR). Red Piranha and Cybersecurity Insiders conducted a comprehensive survey to reveal the latest XDR trends and challenges in managing XDR, what XDR might replace, and how organizations select security technologies and providers.

(more available)
Added: July 5, 2022
image from Global Small Business Multi-Factor Authentication (MFA) Study

Global Small Business Multi-Factor Authentication (MFA) Study

In May, CRI launched a global study to discover the level of MFA awareness and implementation among 1403 small and medium sized business surveyed across eight countries.

(more available)
Added: July 5, 2022
image from State of Threat Detection & Response

State of Threat Detection & Response

We wanted to gain insights into the experience of security teams who are at the helm of their organization’s detection and response operations and uncover more about what they experience each day. We surveyed over 400 security engineers and analysts to understand the current state of detection and response.

(more available)
Added: June 30, 2022
image from State of Cybersecurity 2022

State of Cybersecurity 2022

This survey report focuses on the current trends in cybersecurity workforce development, staffing, cybersecurity budgets, threat landscape and cyber-maturity. The survey findings reinforce past reporting and, in certain instances, mirror prior year data. Staffing levels, ease of hiring and retention remain pain points across the globe, and declining optimism about cybersecurity budgets reversed course this year.

(more available)
Added: June 10, 2022
image from 2022 MSP Threat Report

2022 MSP Threat Report

This report was created by the ConnectWise Cyber Research Unit (CRU) - a dedicated team of ConnectWise threat hunters that identifies new vulnerabilities, researches them, and shares what they find for all to see in the community. The CRU monitors ransom leak sites and malicious botnets for new threats, uses OSINT resources, and utilizes data from the ConnectWise SIEM powered by Perch to help create content and complete research.

(more available)
Added: June 10, 2022
image from Cisco Global Hybrid Work Study 2022

Cisco Global Hybrid Work Study 2022

This research aimed to uncover insights into how employees have fared over the past two years, where hybrid and remote working has been commonplace. It reveals the significant benefits that hybrid working has brought to both employees and employers, despite the challenges anticipated at the start of the pandemic.

(more available)
Added: May 31, 2022
image from The State of Pentesting 2022

The State of Pentesting 2022

The State of Pentesting 2022 Report focuses on issues and stats that are relevant to both security and development teams: to separate these two inextricably linked groups would only yield a partial picture of the security landscape.

(more available)
Added: May 4, 2022
image from Cyber Security in Focus 2022

Cyber Security in Focus 2022

An annual state of the market report, which explores the views of a snapshot cohort of 55 security leaders on key themes, including; the skills shortage, barriers to strategy execution, the business perception of cyber security, and more.

(more available)
Added: January 20, 2022
image from Security Outcomes Study Vol. 2

Security Outcomes Study Vol. 2

Over 5,100 IT and security professionals across 27 countries were asked about their organizations’ approaches to updating and integrating security architecture, detecting and responding to threats, and staying resilient when disaster strikes. They shared a wide range of insights, struggles, strategies, and successes. Responses were analyzed in multiple ways and key findings were extracted.

(more available)
Added: December 7, 2021
image from The Impact of the Solarwinds Breach on Cybersecurity

The Impact of the Solarwinds Breach on Cybersecurity

A survey of 200 global security professionals as to their opinions, responses, and outlook of the Solarwinds software chain compromise.

(more available)
Added: March 14, 2021
image from Identity and Access Management: The Stakeholder Perspective

Identity and Access Management: The Stakeholder Perspective

This report aims to capture hard data on the experiences of stakeholders who are impacted by IAM processes and technologies, and the impact of current IAM practices on security risks and business operations.

(more available)
Added: February 22, 2021
image from The 2021 Security Outcomes Study

The 2021 Security Outcomes Study

Based on a survey of over 4,800, this report reviews the practices that lead to positive outcomes for security programs. Linking together practices that are more (or less) successful to the characteristics of positive outcomes, this report aims to give guidance for where practitioners can focus their efforts to achieve similar outcomes.

(more available)
Added: December 1, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)