Statistics about Technology & Telecommunications in Worldwide
Statistics
- Factors for resigning from cybersecurity job worldwide 2024
- Skills gaps among recent university graduates worldwide 2023 vs. 2024
- Factors determining qualification for a cybersecurity job worldwide 2024
- Future hiring demand in cybersecurity worldwide by job type 2024
- Companies' cybersecurity staffing worldwide 2023 vs. 2024
- Check Point Software Technologies total revenue 2016-2023
- Business, technology and security executives' views on Generative AI worldwide 2023
- Cloud-based services for OT/ICS systems used in organizations worldwide 2021
- YoY change in supply chain cybersecurity spending worldwide 2021
- Location of containers 2022
- Priority of improving cyber security technology worldwide 2023, by region
- Level of difficulty when implementing ZT strategies in an extended network 2022
- Tech regulations with the greatest impact on companies' future growth worldwide 2023
- Leading cyber security initiatives worldwide 2023
- FIDO authentication market value 2022 & 2032
- Favorite security authentication methods in selected countries 2024
- Most secure authentication methods in selected countries 2024
- Responsibility for cybersecurity testing within firms worldwide 2023
- Main challenges in implementing DevSecOps worldwide 2023
- Most important KPIs to measure DevSecOps activities success worldwide 2023
- Main benefits of implementing Zero Trust solutions worldwide 2022
- Global Zero Trust priorities 2022, by region
- Global level of understanding of Zero Trust policies 2022
- Global level of understanding of ZTNA policies 2022
- Main difficulties when addressing Zero Trust policies worldwide 2022, by region
- Critical IT infrastructure areas worldwide 2022-2023
- Deployment of containers at the edge 2022
- Main drivers and enablers of insider attacks worldwide 2023
- Main benefits of adopting FIDO standards by companies worldwide 2023
- Share of servers hosted on-premises and on the cloud worldwide 2021-2024
- Skill gaps among cybersecurity personnel worldwide 2024
- FIDO standards adoption by companies for workforce authentications worldwide 2023
- Global companies utilization of public cloud services 2024
- Preference for passwordless versus passwords worldwide 2023, by age group
- Future replacement of passwords by passwordless authentication worldwide 2023
- Main ways to monitor user behavior for security purposes worldwide 2023
- Main business justifications for IT investments worldwide 2021
- Frequency of data loss protection methods worldwide 2021
- Top container runtime technology 2022, by runtime engine
- Kubernetes security open source solutions 2022, by tools
- Top concerns for container strategy 2022
- Global funding raised by Cyber 66 cybersecurity companies 2022, by company category
- Global biometric authentication growth 2021, by industry
- Zero trust security implementation by software organizations worldwide 2022
- Changes in companies' Zero Trust budget worldwide 2022, by region
- Main authentication factors used by governmental organizations worldwide 2022
- Global Zero-trust order of strategy priorities 2023
- Global job satisfaction rates of cybersecurity professionals 2019-2020
- Main authentication factors used by finance organizations worldwide 2022
- Global cybersecurity professionals’ average annual salary 2020, by age
- Main authentication factors used by software organizations worldwide 2022
- Zero trust security implementation by healthcare organizations worldwide 2022
- Implementation passwordless access worldwide 2022, by industry and deployment status
- Critical cybersecurity areas worldwide 2022-2023
- Zero trust security implementation by finance organizations worldwide 2022
- Cybersecurity standards usage for control systems in organizations worldwide 2021
- Global staffing levels of dedicated cybersecurity personnel 2020
- Leading M&A deals in cybersecurity worldwide 2020, by value
- Zero Trust prioritized requirements for companies worldwide 2022, by deployment
- Identity importance to overall Zero Trust security strategy worldwide 2022
- Global tools used by companies for supply chain cybersecurity protection 2022​
- Main authentication factors used by healthcare organizations worldwide 2022
- Frequency of companies reviewing their CSIRP worldwide 2021
- Global shortage of cybersecurity skills 2021, by tech category
- Extended use of SSO and/or MFA by organizations worldwide 2022
- Cybersecurity priorities during COVID-19 worldwide 2020
- Control system components at risk for compromise worldwide 2022
- Global critical infrastructure cybersecurity market 2020-2030
- IT incident response support in organizations worldwide 2022
- Stressful aspects of cybersecurity professionals' careers worldwide 2021
- Global cybersecurity market 2015-2020, by segment
- Working relationship between cybersecurity & other departments worldwide 2021
- Main tools to be integrated within IAM in support of Zero Trust worldwide 2022
- Total global revenue of Forescout 2015-2019
- Rates of local language spam
- McAfee's global net revenue 2019-2020, by segment
- Hackers' preferred technique, attack vector or method worldwide 2019
- Cybersecurity gap assessment worldwide 2023, by country
- Leading global cybersecurity skills needed by professionals 2020
- Share of companies that have a security policy covering OSS worldwide 2022
- Stuxnet - percentage of infected hosts by country
- Policies and processes for managing SaaS misconfigurations worldwide 2023
- Corporate endpoint security software products market share 2018-2021, by vendor
- Security software global market revenue 2009-2023
- Usage of blockchain security solutions worldwide 2018 and 2019
- Methods for monitoring SaaS security configurations worldwide 2022
- Median bounty values worldwide 2020, by severity
- Change in level of spending for cybersecurity solutions worldwide 2020
- Stuxnet infections with Siemens software installed
- Mobile devices installed with mobile security software 2013-2018
- IT security annual budget allocation worldwide 2021
- Global hosting infrastructure network critical vulnerability taxonomy 2020
- Total global security appliance market share by vendor 2013-2016
- IT specialized threat analysis and protection market size 2011-2019
- IT specialized threat analysis and protection market share 2014, by vendor
- IT specialized threat analysis and protection market size 2011-2019, by segment
- Top cybersecurity companies worldwide 2017-2020
- Cybersecurity venture capital investment worldwide 2014-2018
- Common methods for analyzing and consolidating endpoint data in global organizations
- Countries most attacked by banking trojans Q2 2014