Statistics about Technology & Telecommunications in Worldwide
Statistics
- Global use of cyber threat intelligence (CTI) 2022
- Update frequency of CTI requirements worldwide 2022
- Number and value of M&A deals 2018-2022, by quarter
- Number and value of M&A deals in cyber security worldwide 2018-2022
- Main control system cybersecurity organizational plans worldwide 2024
- Impact of certifications when recruiting cybersecurity talent worldwide 2024
- Value of M&A deals in cyber security worldwide 2018-2022, by type
- Main control system security sources used by organizations worldwide 2024
- Leading M&A deals in cybersecurity worldwide 2022, by value
- CISOs agreeing that cybersecurity expertise is required at top level 2023, by country
- Share of venture capital exits in cyber security worldwide 2021-2022, by deal value
- Global companies' difficulty in diversity hiring for IT staff 2024
- Global concerns regarding former employees accessing company infrastructure 2022
- Main uses of AI in cybersecurity worldwide 2024
- CISOs planning to deploy AI capabilities against cyber threats 2024, by industry
- Main cybersecurity solutions to safeguard operational technology 2022-2024
- Main actors involved in recent (CS)² compromises 2020-2023
- Companies' willingness to pay for staff's tech certification 2024, by region
- Hurdles in reducing control system cybersecurity field attack surface worldwide 2024
- Main vendors advice on control system security KPIs worldwide 2024
- HR and company culture challenges related to hybrid work set-ups worldwide 2022
- Main attack vectors in control system cybersecurity incidents worldwide 2020-2023
- CISO responsibility for operational technology cyber security 2022-2024
- Main components included in control system cybersecurity assessments worldwide 2024
- CISOs worldwide considering generative AI as a security risk 2024, by industry
- Burnout among CISOs within the past 12 months 2023, by country
- CISOs who agree with their board on the issue of cybersecurity 2024, by industry
- Global security methods used to grant access to infrastructure 2021-2022
- Global concerns regarding employees leaving with infrastructure access knowledge 2022
- Share of M&A deals in cyber security worldwide 2018-2022, by deal value
- Main impacts of control systems security incidents worldwide 2020-2023
- Confidence in responding to control system cyberattacks worldwide 2024
- Most difficult cybersecurity roles to fill worldwide 2023
- Global mobile device security market 2022-2028
- Giesecke+Devrient net sales 2018-2023
- Reasons to deploy passwordless authentication methods globally 2022
- Main cybersecurity benefits to operational technology 2022 vs. 2023
- Share of women in cybersecurity teams worldwide 2023
- Global biometric authentication and identification market 2020-2026, by end user
- Reasons why global companies did not deploy passwordless 2022
- Global password management market revenue 2020-2030
- Corporate passwordless deployment worldwide 2022, by stage
- Corporate passwordless methods worldwide 2022, by type
- Companies' familiarity with FIDO2 worldwide 2022
- Adoption of DevSecOps 2022
- Main malware techniques used by global companies in EDR strategies H1 2022
- Main malware tactics used by global companies in EDR strategies H1 2022
- Global threat hunting market value 2023-2033
- Global threat detection system market value 2023-2034
- Global cyber threat intelligence (CTI) market size 2033, by country
- Share of endpoint vulnerabilities H1 2023, by platform
- Leading cybersecurity companies worldwide 2024, by market cap
- Share of women in cybersecurity teams worldwide 2023, by industry
- Popularity of orchestration service 2022, by platform
- Median deal value of M&A deals in cyber security 2018-2022
- Zscaler gross profit 2018-2024
- Number and value of investment deals in cyber security worldwide 2018-2022
- Most funded private companies in cyber security worldwide 2022, by funding value
- CISOs who agree their organization mitigate supply chain risk 2023, by country
- Number and value of investment deals in cybersecurity worldwide 2018-2022, by quarter
- Main priorities for companies' IT security departments worldwide 2024
- Protocols put in place by CISOs to to combat organizational data loss 2024
- Top cyber security investors worldwide 2022, by number of investments
- Zscaler total revenue 2016-2024
- Security as a Service revenues worldwide 2022-2032
- Annual growth of cybersecurity spending worldwide 2019-2026, by sector
- CISOs that believe human error is biggest cyber vulnerability 2024, by country
- Giesecke+Devrient net sales 2018-2023, by segment
- Tools used in companies' security awareness programs 2021, by country
- Security awareness training programs on MFA 2021, by country
- Global malware masqueraded as online collaboration applications 2020, by application
- Average global cybersecurity salary 2023, by gender
- Most active investors in cyber security worldwide 2018-2022, by number of investments
- Importance for companies worldwide to transition to a zero trust architecture 2022
- Global factors for deploying IT security technologies in organizations 2021
- Global number of failed logins before resetting login credentials 2021, by age group
- Measures taken by global organization to create a positive work culture 2022
- Company strategy for converting SSO with MFA 2021
- Automatic functions of a password manager worldwide 2021
- Main barriers regarding password manager usage worldwide 2021
- Main use of a password manager worldwide 2021
- Online credentials storage habits worldwide 2021, by age
- Global password security preference 2021, by age group and account
- Average time spent setting up a new digital account worldwide 2021
- Share of respondents reusing the same credentials for new accounts worldwide 2021
- Password reuse habits worldwide 2021, by number of websites
- Global MFA usage by companies 2021, by type
- Main factors when choosing a passwordless solution worldwide 2021
- Most frequent password sharing methods worldwide 2021
- Public opinion on people who should use a password manager worldwide 2021
- Cyber security venture capital funding worldwide 2017-2022
- Global reasons why cybersecurity professionals left their previous job 2022
- Deployment level of SSO system worldwide 2022, by region
- Main tools integrated within companies' IAM system worldwide 2022
- Zero Trust security initiatives worldwide 2019-2022
- FireEye worldwide operating net cash 2017-2020
- Key factors for successful hybrid work arrangements worldwide 2022
- Most gender diverse countries related to cybersecurity professionals 2022
- Main barriers to adopting passwordless authentication worldwide 2022
- Areas of responsibilities of cyber security professionals worldwide 2021