Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Vulnerability

Below you will find reports with the tag of “Vulnerability”

image from The State of Attack Surface Management 2022

The State of Attack Surface Management 2022

In this report, the findings show that in order to resolve the attack surface management challenges facing organizations, IT and security teams need to invest in solutions that automate and centralize monitoring of internet-facing assets and provide greater insights into vulnerabilities.

(more available)
Added: October 10, 2022
image from 2022 State of the Internet Report

2022 State of the Internet Report

Censys maintains the most comprehensive view of assets on the Internet by continuously scanning the public IPv4 address space across the 3,500 most popular ports. This Internet-wide scan data also powers our Attack Surface Management (ASM) product, which comprehensively maps organizations’ Internet exposure. This data allows us to understand broader trends in Internet security and how organizations are exposed across the Internet.

(more available)
Added: October 10, 2022
image from The State of Offensive Security 2022

The State of Offensive Security 2022

This report dives into major security challenges, while also providing guidance for how enterprises can close the gap between what attackers see and what defenders think they’re protecting. They surveyed 398 IT and security decision-makers in the U.S. and Canada, and discovered that enterprises are struggling to keep up with a rapidly changing threat landscape due to process challenges that are overwhelming security staff.

(more available)
Added: October 10, 2022
image from The State of Secrets Sprawl 2022

The State of Secrets Sprawl 2022

In this report, data reveals that on average, in 2021, a typical company with 400 developers would discover 1,050 unique secrets leaked upon scanning its repositories and commits. With each secret detected in 13 different places on average, the amount of work required for remediation far exceeds current AppSec capabilities: with a security-to-developers ratio of 1:100.

(more available)
Added: October 5, 2022
image from You Think Ransomware Is Your Only Problem? Think Again

You Think Ransomware Is Your Only Problem? Think Again

Organizational leaders of all types understand that ransomware can cause extreme damage to the organization’s ability function and, in some cases, even survive. Ransomware is not just an IT issue but a situation involving the highest levels of management, including the CEO. Ransomware attacks can be so significant that they trigger a disaster response using traditional disaster recovery (DR) tools and methods.

(more available)
Added: October 4, 2022
image from Cyber Security Report 2022

Cyber Security Report 2022

The 2022 Cyber Security Report uncovers the key cybersecurity trends from 2021, including a supply chain attack ‘frenzy’ and increased disruption to everyday life. Education and Research were revealed as the most targeted sector. The report gives a detailed overview of the cyber threat landscape and recommendations on how to prevent the next cyber pandemic.

(more available)
Added: September 29, 2022
image from VPN Risk Report 2021

VPN Risk Report 2021

The 2021 VPN Risk Report surveyed 357 cybersecurity professionals, providing insight into the current remote access environment, the state of VPN within the enterprise, the rise in VPN vulnerabilities, and the role that zero trust will play in enabling access to apps going forward.

(more available)
Added: September 29, 2022
image from State of Cloud Native Application Security

State of Cloud Native Application Security

As companies embrace cloud native technologies as part of their digital transformation, security is seen as a key factor to building successful platforms. While only 36% of respondents stated that security was one of the main reasons for moving their production applications into containers, 99% of respondents recognize that security as an important element in their cloud native strategy.

(more available)
Added: September 28, 2022
image from VPN Risk Report

VPN Risk Report

This report is based on the results of a comprehensive online survey of 351 IT and cybersecurity professionals, conducted in June 2022 to identify the latest enterprise adoption trends, challenges, gaps, and solution preferences related to VPN risk. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: September 26, 2022
image from Quantifying the Public Vulnerability Market: 2022 Edition

Quantifying the Public Vulnerability Market: 2022 Edition

Omdia conducted a comprehensive comparative analysis of the output of 11 organizations that disclose information security vulnerabilities. The data collected for this report stems from multiple courses, including the following: primary internal research, individual vendor interviews, open course publications and publicly disclosed reports.

(more available)
Added: September 22, 2022
image from The GitLab 2022 Global DevSecOps Survey

The GitLab 2022 Global DevSecOps Survey

In May 2022, over 5,000 DevOps professionals shared details about their teams and practices. Despite a challenging business environment, strong momentum continued in automation, release cadences, and cutting-edge technology adoption. Secure software development is now an imperative for DevOps teams around the world. It’s the number one reason for - and benefits of - DevOps platform usage.

(more available)
Added: September 20, 2022
image from GritLab DevSecOps Global Survey 2021

GritLab DevSecOps Global Survey 2021

For the fourth year in a row, we asked DevOps teams to tell the truth about their practices and processes, their challenges and their careers. With a global pandemic swirling, we were surprised when nearly 4,300 people took time to do just that this past February. In 2021, teams are poised to step out of the DevOps “culture” battle and into the real work of technology implementation and (surprisingly) upbeat results.

(more available)
Added: September 15, 2022
image from The State of Cloud Security Report 2022

The State of Cloud Security Report 2022

For this report, Snyk surveyed more than 400 cloud engineering and security professionals to better understand the cloud risks and challenges they face, and how they’re successfully improving their cloud security efforts.

(more available)
Added: September 15, 2022
image from State of API Security Q3 2022

State of API Security Q3 2022

The State of API Security Report from Salt Labs is the industry’s only report on API security risks, challenges, and strategies. The Q3 2022 report incorporates survey results and empirical data from the Salt SaaS platform hosting our customers’ API metadata. The most eye-opening findings from the report comes from our customers. Over the past year, Salt customers experienced a 117% increase in API attack traffic while their overall API traffic grew 168%.

(more available)
Added: September 15, 2022
image from Bulletproof Annual Cyber Security Industry Report 2022

Bulletproof Annual Cyber Security Industry Report 2022

In this report, Bulletproof looks back on a fascinating year in the world of cyber security and compliance, with a keen eye on emerging patterns for what to expect in 2022 and beyond. Assessing data from our SIEM platform, honeypots, penetration testing and compliance services gives us a great insight into new cyber security threats and the state of cyber defenses across various industries.

(more available)
Added: September 13, 2022
image from State of XIoT Security: H1 2022

State of XIoT Security: H1 2022

The State of XIoT Security report is Claroty’s contextual analysis of cyber-physical security. The data presented in this edition of the report covers the first six months of 2022, and sheds light on the key trends and recommended actions you can apply within your enterprise.

(more available)
Added: September 9, 2022
image from Media Industry Cybersecurity Challenges

Media Industry Cybersecurity Challenges

BlueVoyant performed a cyber posture analysis of the vendors in the media industry sector. The approach was to identify and analyze the most prevalent vendors in the industry, as well as look at the extended vendor ecosystem for comparison, to gain a deep understanding of the issues the industry is facing. A total of 485 vendors were assessed.

(more available)
Added: August 31, 2022
image from Attack Path Management Impact Report

Attack Path Management Impact Report

This report shares insights from the XM Cyber Research team’s analysis of the Attack Path Management platform from January 1st, 2021 - December 31st, 2021. The Impact report begins with a close look at the methodology of attack paths and then reveals the impact of attack techniques used to compromise critical assets across organizations, whether hybrid, on-prem or multi-cloud.

(more available)
Added: August 31, 2022
image from 2022 Cyber Attack Trends: Mid-Year Report

2022 Cyber Attack Trends: Mid-Year Report

In this report we take a closer look at how cyber warfare has intensified to become an essential part of the preparation for, and conduct of, actual military conflict. Furthermore, we uncover what the fallout of this will be for governments and enterprises all over the world, even those that are not directly involved in the conflict.

(more available)
Added: August 26, 2022
image from Global Threat Landscape Report H1 2022

Global Threat Landscape Report H1 2022

In our H1 2022 FortiGuard Labs Threat Landscape Report, we examine the cyber threat landscape during the year’s first half to identify trends and offer recommendations about what CISOs and security teams should pay close attention to in the months ahead. The report’s findings are based on data collected through our global array of sensors monitored by the FortiGuard Labs team.

(more available)
Added: August 24, 2022
image from 2022 H1 Global Threat Analysis Report

2022 H1 Global Threat Analysis Report

Radware’s first half of 2022 threat report reviews the most important cybersecurity events, and provides detailed insights into the attack activities for the first six months of 2022. The report leverages intelligence provided by Radware’s Threat Intelligence Team, network and application-attack activity sourced from Radware’s Cloud and Managed Services, Radware’s Global Deception Network, and Radware’s Threat Research team.

(more available)
Added: August 19, 2022
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 20:08 UTC (build b1d7be4)