Cybersecurity Research - CRA Business Intelligence - SC Media
SC MediaArchived Mar 16, 2026✓ Full text saved
Cybersecurity Research - CRA Business Intelligence SC Media
Full text archived locally
✦ AI Summary· Claude Sonnet
CYBERSECURITY RESEARCH - CRA BUSINESS INTELLIGENCE | SC MEDIA
AI benefits/risks
The most successful AI projects feature buy-in from top management
Endpoint/Device Security
Threat actors target remote endpoints to conduct BECs, steal credentials and load malware
Threat Intelligence
Threat Intelligence: The gold standard for 21st century cybersecurity
MORE FROM CRA BUSINESS INTELLIGENCE
INCIDENT RESPONSE
Incident response at organizations can run from cool to chaotic
Stephen WeigandMay 3, 2023
Nearly three-quarters (73%) of survey respondents say their organization has an incident response playbook to guide decision-making during a cybersecurity incident.
THREAT MANAGEMENT
Rising global tensions, economic uncertainty top concerns for security pros
Steve ZurierMay 2, 2023
Security professionals are also concerned about the rising threat landscape and the reality that breaches cost organizations much more than money.
IDENTITY
Vast majority of security and IT pros take IAM more seriously
Steve ZurierApril 10, 2023
Ninety-eight percent of security pros surveyed say they are grappling with IAM issues, with 44% saying they’ve already implement IAM in part or in-full.
ZERO TRUST
Companies are moving forward with zero trust, but still report challenges
Steve ZurierMarch 20, 2023
Security pros see the need for continuing the zero-trust journey, but 30% admit it will be very difficult.
THREAT MANAGEMENT
Why good threat hunters are hard to find
Steve ZurierFebruary 22, 2023
New CRA study says while companies still struggle to find qualified threat hunters, there’s been significant progress over the past two years, and a majority of respondents plan to implement a threat-hunting program in the next 12 months.
THREAT MANAGEMENT
Organizations want threat intelligence, but struggle to make it actionable
Steve ZurierJanuary 26, 2023
Without proper mechanisms to manage the volume and velocity of threat feeds, security teams are easily overwhelmed, and security operations are stymied by an inability to makes sense of a firehose of feed data and false positives.
ZERO TRUST
SSE deployment expected this year, say security pros in new CRA survey
Steve ZurierJanuary 26, 2023
The vast majority of security pros say they expect to spend more on network security in 2023 – and some two-thirds of those surveyed say they will deploy SSE this year.
VULNERABILITY MANAGEMENT
Vulnerability management strategies evolve in 2022 as supply chain risk grows
Bill BrennerDecember 30, 2022
As part of our Year in Review series, we examine how cyber attackers capitalized on security vulnerabilities that emerged with the rush to cloud-based, remote operations, and what security teams did to respond.
THREAT MANAGEMENT
Cyberwar in Ukraine, ransomware fears drive 2022 surge in demand for threat intelligence tools
Bill BrennerDecember 29, 2022
As part of our Year in Review series, we examine the growing interest in threat intelligence that was fueled in part by fear of cyberattacks tied to the war between Russia and Ukraine.
THREAT MANAGEMENT
New threats expand use cases for XDR threat detection in 2022
Bill BrennerDecember 29, 2022
As part of our Year in Review series, we examine how organizations continue to grapple with the pace of threats, and have turned to eXtended Detection and Response to gain an edge over attackers.
Loading...
ABOUT
CRA Business Intelligence is a full-service market research capability focused on the cybersecurity industry. Drawing upon CRA’s deep subject-matter expertise and engaged community of cybersecurity professionals – along with a world-class market research competency – CRA Business Intelligence is unique in the industry. These components together enable delivery of unparalleled data and insights anchored in our community of cybersecurity professionals and leaders eager to share their perspective on the industry’s most important concerns. Our research expertise – rooted in our qualified community of cybersecurity professionals and access to practitioner insights – guides all phases of our process, including project design, data analysis and insight assessment, and content development.