Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Supply Chain

Below you will find reports with the tag of “Supply Chain”

image from Top 10 Global Business Risks of 2017

Top 10 Global Business Risks of 2017

The sixth annual Allianz Risk Barometer identifies the corporate perils for 2017 and beyond, based on the responses of more than 800 risk experts from 40+ countries around the globe.

(more available)
Added: October 20, 2018
image from The Emotional Side of Virtualization

The Emotional Side of Virtualization

Virtualization is a strategic priority at large companies, and trust plays a crucial role in their choice of cloud service provider and in determining the type of data they store outside company infrastructure, according to a Bitdefender survey of 503 IT decision makers at companies in the US, the UK and Germany with more than 1,000 PCs. Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment, and CIOs have to adapt to the new world. This survey, carried out by iSense Solutions, reveals why companies virtualize, which countries CIOs trust and what kind of data companies care most about.

(more available)
Added: October 19, 2018
image from World Economic Situations And Prospects: Update as of mid-2018

World Economic Situations And Prospects: Update as of mid-2018

The present document updates World Economic Situation and Prospects 2018 (United Nations publication, Sales No. E.18.II.C.2), released in December 2017.

(more available)
Added: October 19, 2018
image from Vendor Selection & GDPR Compliance

Vendor Selection & GDPR Compliance

This report offers a unique approach to understanding GDPR compliance. The report is a presentation of an interview with two individual CEO’s from two seperate companies.

(more available)
Added: October 18, 2018
image from A Holistic Approach To Identity Managing For The Internet Of Things

A Holistic Approach To Identity Managing For The Internet Of Things

This whitepaper will introduce this new hierarchy of IoT IdM requirements. It will explain how enterprises and governmental agencies should employ a new generation of Cloud-based IdM solutions that can scale to meet today’s escalating IoT security requirements, and enable organizations to fulfill the promise of today’s connected world.

(more available)
Added: October 17, 2018
image from United Kingdom - Views From The C-Suite Survery 2018

United Kingdom - Views From The C-Suite Survery 2018

All available industry statistics show that cybersecurity attacks and breaches continue to rise—so how prepared are UK companies to manage cyberattacks? In this survey we asked organisations about their plans for investment and about how well they think they are managing cyber risk.

(more available)
Added: October 17, 2018
image from UK 2015 Cyber Risk Survey Report

UK 2015 Cyber Risk Survey Report

This is an in-depth study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. The benchmarking data in this report was collected from risk professionals and CFOs from large and medium-sized corporations from across the UK. It is the hope that the aggregated information will provide useful benchmarking data and reference points against which the reader can compare their own company’s positions.

(more available)
Added: October 16, 2018
image from Gemalto Expands Service Based Security Platform With SafeNet Data Protection On Demand

Gemalto Expands Service Based Security Platform With SafeNet Data Protection On Demand

This report offers a good look at Gemalto’s new service based security platform.

Added: October 15, 2018
image from 2015 Internet Crime Report

2015 Internet Crime Report

The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS).

(more available)
Added: October 14, 2018
image from Cyber Security Breaches Survey

Cyber Security Breaches Survey

From the UK, this report was commissioned by the Department for Culture, Media and Sport (DCMS) and it details the findings from a quantitative and qualitative survey with UK businesses on cyber security.

(more available)
Added: October 14, 2018
image from Supply Chain Compliance

Supply Chain Compliance

This paper discusses the important new rules in the DFARS cyber clause. It seeks to help organizations by revealing key steps to becoming compliant.

(more available)
Added: October 14, 2018
image from The Enterprise Lacks A Big Data Strategy For IoT Transformation

The Enterprise Lacks A Big Data Strategy For IoT Transformation

From the report, “Internet of Things (IoT) technology holds incredible promise for transforming the enterprise, but one of the biggest hurdles for companies implementing IoT will be extracting insight from the incredible volumes of fast-moving data these systems produce and integrating that resulting intelligence into business processes in real time.”

(more available)
Added: October 13, 2018
image from Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Connected cars are facing four fundamnetal challenges that need to be overcome. See what these automotive Ethernet industry challenges are and the solutions that are available to help overcome several of the challenges.

(more available)
Added: October 13, 2018
image from 2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

2017 Ethics And Compliance Third-Party Risk Management Benchmark Report

This report will help you benchmark your third-party risk management program and its performance against trends in the market and best practices.

(more available)
Added: October 12, 2018
image from Validating The New World Of 400 Gigabit Ethernet: The Return Of Industry Benchmarking

Validating The New World Of 400 Gigabit Ethernet: The Return Of Industry Benchmarking

Read this white paper to understand why this is a critical time to renew efforts to compare and benchmark the performance of these new network products and devices.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)