Statistics about Technology & Telecommunications in Worldwide
Statistics
- Companies' common perception of Zero Trust security model worldwide in 2021
- Main solutions used by companies to enable Zero Trust segmentation worldwide 2021
- Zero trust implementation worldwide 2021, by security risk area and deployment state
- Challenges implementing micro-segmentation into a company's Zero Trust strategy 2021
- Companies' expectations concerning Zero Trust budgets worldwide 2021
- Main challenges when adopting Zero Trust strategies worldwide 2021, by type
- Global hybrid workplace concerns 2021
- Deployment level of Zero Trust strategies in hybrid work places worldwide 2021
- Importance of Zero Trust strategies to a company's success 2021
- Main motivations to implementing Zero Trust strategies worldwide 2021
- FireEye global revenue 2017-2020, by segment
- FireEye global revenue 2015-2020
- Global job satisfaction rates of cybersecurity professionals 2019-2020
- Working relationship between cybersecurity & other departments worldwide 2021
- Leading M&A deals in cybersecurity worldwide 2020, by value
- Frequency of companies reviewing their CSIRP worldwide 2021
- Soft skills needed by security professionals worldwide 2023
- Time to fill a cyber security position in companies worldwide by level 2023
- Cybersecurity standards usage for control systems in organizations worldwide 2021
- Global shortage of cybersecurity skills 2021, by tech category
- Stressful aspects of cybersecurity professionals' careers worldwide 2021
- YoY change in supply chain cybersecurity spending worldwide 2021
- Global critical infrastructure cybersecurity market 2020-2030
- Skills gaps among recent university graduates worldwide 2023
- Post-pandemic cybersecurity priorities worldwide 2020
- Cybersecurity priorities during COVID-19 worldwide 2020
- Global policy-blocked authentications 2021
- Cyber risk assessment challenges worldwide 2023
- Global cybersecurity professionals’ average annual salary 2020, by age
- Skill gaps among cybersecurity personnel worldwide 2023
- Global tools used by companies for supply chain cybersecurity protection 2022
- Impact of certifications when recruiting cybersecurity talent worldwide 2024
- Global companies' level of understanding of cyber risks from third parties 2021
- Most difficult cybersecurity roles to fill worldwide 2023
- Most common cyber security incidents experienced by companies worldwide 2020, by type
- Solutions implemented by companies as part of a Zero Trust strategy worldwide 2021
- Cyber security investment priorities for companies worldwide 2022
- Average share of total spending on cyber simplification worldwide 2021
- Employer-led cyber security education worldwide 2021
- Maturity level of companies' cyber resiliency programs worldwide 2021
- Share of respondents considering a passwordless strategy 2021, by country
- Investments which improved companies' cyber resiliency worldwide 2021
- Reasons why cyber resiliency hasn't improved for companies worldwide 2021
- Areas of responsibilities of cyber security professionals worldwide 2021
- Key factors for successful hybrid work arrangements worldwide 2022
- FireEye worldwide operating net cash 2017-2020
- Main cyber security benefits to operational technology 2022 vs. 2023
- Global biometric authentication growth 2021, by industry
- Top attributes sought in cybersecurity professionals worldwide 2023 vs 2022
- Most convenient global MFA methods 2021
- IT service provider threats experienced and concerns worldwide 2020, by category
- Giesecke+Devrient net sales 2018-2022
- Skill gaps among cybersecurity personnel worldwide 2023
- Confidential computing TAM market share worldwide 2021-2026, by industry
- Confidential computing TAM share worldwide 2021-2026, by region
- Confidential computing TAM share worldwide 2021-2026, by technology segment
- Confidential computing TAM worldwide 2021-2026, by scenario
- DDoS attack sources on Azure infrastructure worldwide 1H 2021, by region
- Cutbacks in cybersecurity roles worldwide 2023
- Global identity and management (IAM) data captured about users 2021
- Global cyber threat intelligence (CTI) market size 2023-2033
- Global malware masqueraded as online collaboration applications 2020, by application
- DDoS attack destinations on Azure infrastructure worldwide 2021, by region
- Share of DDoS attacks on Microsoft Azure infrastructure worldwide 2021, by duration
- Giesecke+Devrient net sales 2018-2022, by segment
- Cybersecurity budget changes for companies worldwide 2024
- Cyber security venture capital funding worldwide 2021-2023, by quarter
- Main control system cybersecurity organizational plans worldwide 2024
- Main control system security sources used by organizations worldwide 2024
- Main components included in control system cybersecurity assessments worldwide 2024
- Confidence in responding to control system cyberattacks worldwide 2024
- Main impacts of control systems security incidents worldwide 2020-2023
- Main attack vectors in control system cybersecurity incidents worldwide 2020-2023
- Main vendors advice on control system security KPIs worldwide 2024
- Main reasons why companies worldwide adopted passwordless authentication 2022
- Main investment areas for OT cybersecurity worldwide 2024, by region
- Hurdles in reducing control system cybersecurity field attack surface worldwide 2024
- Main actors involved in recent (CS)² compromises 2020-2023
- Global venture-backed cybersecurity exits 2011-2020
- Reasons for VPNs usage worldwide 2023
- Public opinion on security education in companies worldwide 2021
- New cybersecurity unicorns worldwide 2021, by funding value
- Number of global cyber security VC funding deals closed 2021-2023, by quarter
- Favorite security authentication methods in selected countries 2023
- Global Zero Trust security market value 2023-2032
- Main business justifications for IT investments worldwide 2021
- Critical IT infrastructure areas worldwide 2022-2023
- Leading cybersecurity companies worldwide 2024, by market cap
- Main ways to monitor user behavior for security purposes worldwide 2023
- Main insider attack challenges faced by companies worldwide 2023
- Main drivers and enablers of insider attacks worldwide 2023
- Top container runtime technology 2022, by runtime engine
- Kubernetes security open source solutions 2022, by tools
- Top concerns for container strategy 2022
- Deployment of containers at the edge 2022
- Location of containers 2022
- Types of data most susceptible to insider attacks worldwide 2023
- Most concerning insider threat motivations worldwide 2023
- Detecting and preventing insider vs. external cyberattacks worldwide 2023
- Main difficult aspects of Zero Trust to be managed technically worldwide 2021