Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Staffing

Below you will find reports with the tag of “Staffing”

image from The State Of Incident Response 2017

The State Of Incident Response 2017

This report is based on a survey that revealed new data that companies are struggling to keep up with the demands of their security needs due lack of resources, both on the security tools sid and personnel side.

(more available)
Added: October 26, 2018
image from Threat Intelligence: Tax Related Scams Where Motive Meets Opportunity

Threat Intelligence: Tax Related Scams Where Motive Meets Opportunity

Root9B’s Vice President of Threat Intelligence, Keith Smith, sat down to highlight the threat of tax related scams using compromised business email accounts. He also offers some proactive steps your business can take to prevent security breaches and protect sensitive information during this year’s tax season.

(more available)
Added: October 26, 2018
image from 2017: Security Operations Challenges, Priorities, and Strategies

2017: Security Operations Challenges, Priorities, and Strategies

This report concludes that, security operations is fraught with people, process, and technology challenges, that improvement is a high priority, organizations are embracing security orchestration, and orchestration is becoming a centralized platform.

(more available)
Added: October 25, 2018
image from China's Evolving Approach To "Integrated Strategic Deterrence"

China's Evolving Approach To "Integrated Strategic Deterrence"

This report looks at China’s evolving approach to integrated strategic deterrence. Drawing on a variety of Chinese military writings, this report explores the origins of this concept, how it relates to Chinese development of counter-intervention capabilities, and how Beijing’s assessment of its external security environment influences its requirements.

(more available)
Added: October 25, 2018
image from Retaining The Army's Cyber Expertise

Retaining The Army's Cyber Expertise

In this report, they focus on issues related to retaining cyber soldiers. They use data from the Army’s personnel files to determine how many new soldiers are likely to meet the qualifications for this new MOS, as well as their expected retention rates. Specifically, they apply 17C enlist- ment requirements to all soldiers to determine how many meet the standards. They also use data on civilian occupa- tions to determine the earnings these soldiers are likely to be offered based on their military cyber training. To do this, they use the American Community Survey (ACS) data on all workers in information technology (IT)–related occupations.

(more available)
Added: October 25, 2018
image from Rethink The Role Of The CMO

Rethink The Role Of The CMO

In February 2018, Accenture Interactive commissioned Forrester Consulting to evaluate the current and future role of the CMO in building and delivering experiences and the need for organizationwide collaboration. In July 2018, Forrester conducted 10 interviews and an online survey with 250 senior-level marketing decision makers from a range of industries to explore this topic.

(more available)
Added: October 25, 2018
image from SANS Survey on Security Optimization

SANS Survey on Security Optimization

This report discusses the proper workflows in Security Optimization.

Added: October 25, 2018
image from Secure The App Not The Device

Secure The App Not The Device

This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.”

Added: October 25, 2018
image from Security Orchestration and Automation: Closing The Gap in Incident Response

Security Orchestration and Automation: Closing The Gap in Incident Response

In early 2016, Hexadite commissioned the Enterprise Strategy Group (ESG) to complete a study of 100 IT and cybersecurity professionals with knowledge of or responsibility for incident response (IR) processes and technologies at their organizations. This research project was intended to assess the current practices and challenges associated with incident response processes and technologies. Furthermore, respondents were asked about their future strategic plans intended to improve the efficacy and efficiency of IR activities. This paper presents the details of those findings.

(more available)
Added: October 25, 2018
image from The State Of SOAR Report, 2018

The State Of SOAR Report, 2018

There is already a wealth of research that highlights the unending growth in security alerts, a widening security skills gap, and the ensuing fatigue that is heaped upon understaffed security teams. Demisto conducted a large study to delve deeper into these issues, their manifestations, and possible solutions. Their results yielded fascinating insights into the state of cybersecurity in businesses of all sizes.

(more available)
Added: October 25, 2018
image from Left Of Breach 2018

Left Of Breach 2018

Using a unique approach, this paper offers insight into how using a technique of Marine strategy can protect your company from Phishing attacks.

(more available)
Added: October 24, 2018
image from Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

This project sought to draw lessons from the efforts of others (both nation-state and nonstate actors) in and through the IE for future U.S. Army force planning and investment. These case studies of other forces can help the Army (1) identify capabilities and practices that it should consider adopting and (2) identify adversary capabilities and practices that it must be prepared to counter in future operations in and through the IE.

(more available)
Added: October 24, 2018
image from State Of CyberSecurity Implications For 2016

State Of CyberSecurity Implications For 2016

This paper is the presentation of data found through a survey administered in November and December of 2015.

Added: October 24, 2018
image from Security Analytics And Operations In Transition

Security Analytics And Operations In Transition

This report seeks to offer insight into the cybersecurity world and to analyze the dangers and pitfalls of the transition in the profession.

(more available)
Added: October 23, 2018
image from Has The Enforcer Become The Enabler?

Has The Enforcer Become The Enabler?

This paper talks about what the next evolution of Data Loss Prevention technology means for business collaboration and productivity.

Added: October 22, 2018
image from Insights Into Iranian Cyber Espionage APT33

Insights Into Iranian Cyber Espionage APT33

This blog post provides great discussion and insight into an APT operating out of Iran that is specifically targeting the Aerospace and Defense Industries.

(more available)
Added: October 22, 2018
image from Long-term Data Retention Drivers and Trends

Long-term Data Retention Drivers and Trends

There are many reasons to archive data. For too many organizations, “archiving” is immediately presumed to be a cumbersome, unattainable, legacy process that IT had previously deprioritized, while erroneously believing that a “backup copy” held for an extended period of time was a sufficient alternative. Every aspect of that presumption is incorrect—modern archiving is a critical and compelling aspect of nearly every IT organization’s forward-looking strategy.

(more available)
Added: October 22, 2018
image from Cyber Balance Sheet 2017 Report

Cyber Balance Sheet 2017 Report

This study prepared by the Cyentia Institute breaks down walls between cybersecurity leaders and Boards of Direc- tors. Data is often said to be the lifeblood of the company; yet, there is immense frustration at how risks to that information are measured, mitigated, and communicated across the enterprise. As the financial, regulatory, and legal stakes of data breaches and disruptions rise, leaders at all levels must come together to protect and further the business.

(more available)
Added: October 21, 2018
image from Cybersecurity: Labor Market Analysis And Statewide Survey Results

Cybersecurity: Labor Market Analysis And Statewide Survey Results

This report takes a look at the labor market in California, specifically as it relates to Cybersecurity. It offers insight into the growing need for more cybersecurity employees, as well as educational changes that can be made to fill the void.

(more available)
Added: October 21, 2018
image from The Life And Times Of Cybersecurity Professionals

The Life And Times Of Cybersecurity Professionals

This paper examines the life of those in the cybersecurity profession, and seeks to provide answers to the high turnover rate in the field.

(more available)
Added: October 21, 2018
image from 2017 State of Security Operations

2017 State of Security Operations

In this fourth annual State of Security Operations report, Hewlett Packard Enterprise provides updates to the current and emerging capabilities, best practices, and performance levels of security operations as learned from the assessment of organizations around the globe.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 12:08 UTC (build b1d7be4)