Every year when we publish the Cyberthreat Defense Report (2018 edition here), we highlight a handful of emerging (or significantly evolving) areas/technologies we believe have…
Blog
Market Research
In the midst of developing the survey instrument for the 2018 edition of the Cyberthreat Defense Report (prospectus here), I find myself thinking about one…
As we gear up for the 2018 edition of the Cyberthreat Defense Report (prospectus here), I’m reminded of two “emerging” technologies we highlighted in the…
CyberEdge Group’s second annual Cyberthreat Defense Report surfaced a number of emerging areas of interest that we believe will warrant close attention from IT security…
The following infographic summarizes key results from our 2015 Cyberthreat Defense Report. To download the full report, visit https://cyber-edge.com/cdr-2015.
In part 1 of our 2015 Cyberthreat Defense Report blog, next-generation endpoint defenses and threat intelligence services were introduced as two emerging areas of interest…
Palo Alto Networks’ acquisition of Cyvera earlier this year got me thinking about the evolution of endpoint defenses. It’s been obvious for quite some time…
Like its predecessors, the 2014 Verizon Data Breach Investigations Report (DBIR) is a treasure trove of real-world information about the cyberthreat landscape. A big change…
Once again, I made the pilgrimage to San Francisco for the RSA Conference (Feb 24-28). In many ways, the 2014 edition was the same as…