Statistics about Technology & Telecommunications in Worldwide
Statistics
- Cyber security technologies in use and planned for upgrade worldwide 2022
- Most active investors in cyber security worldwide 2018-2022, by number of investments
- Frequency of data loss protection methods worldwide 2021
- Companies' willingness to pay for staff's tech certification 2024, by region
- HR and company culture challenges related to hybrid work set-ups worldwide 2022
- Cutbacks in cybersecurity roles worldwide 2023
- Share of cybersecurity layoffs in selected industries worldwide 2023
- Share of organizations that experienced layoffs in cyber in selected countries 2023
- Impact of cutbacks on cybersecurity organizations worldwide 2023
- Main reasons why companies worldwide adopted passwordless authentication 2022
- Impact of cutbacks on cybersecurity staff and teams worldwide 2023
- Entry method of ransomware attacks worldwide 2021
- Reasons for skills gaps among cybersecurity teams worldwide 2023
- Secondary data storage locations at organizations worldwide 2020-2024
- Share of servers hosted on-premises and on the cloud worldwide 2021-2024
- Main cybersecurity solutions to safeguard operational technology 2022-2024
- Global venture-backed cybersecurity exits 2011-2020
- Main observations regarding the state of cybersecurity work worldwide 2023
- Share of M&A deals in cyber security worldwide 2018-2022, by deal value
- Frequently required access controls in Azure AD 2020-2021
- Most demanded cybersecurity jobs worldwide 2022
- Global companies' difficulty in diversity hiring for IT staff 2024
- Impact of certifications when recruiting cybersecurity talent worldwide 2024
- Most difficult cybersecurity roles to fill worldwide 2023
- CISOs agreeing that cybersecurity expertise is required at top level 2023, by country
- Protocols put in place by CISOs to to combat organizational data loss 2023
- Burnout among CISOs within the past 12 months 2023, by country
- Main cybersecurity benefits to operational technology 2022 vs. 2023
- DDoS attack sources on Azure infrastructure worldwide 1H 2021, by region
- CISOs who agree their organization mitigate supply chain risk 2023, by country
- Confidential computing TAM market share worldwide 2021-2026, by industry
- Main components included in control system cybersecurity assessments worldwide 2024
- Confidence in responding to control system cyberattacks worldwide 2024
- Main impacts of control systems security incidents worldwide 2020-2023
- Main attack vectors in control system cybersecurity incidents worldwide 2020-2023
- Main vendors advice on control system security KPIs worldwide 2024
- Main investment areas for OT cybersecurity worldwide 2024, by region
- Hurdles in reducing control system cybersecurity field attack surface worldwide 2024
- Main actors involved in recent (CS)² compromises 2020-2023
- Average salary in the cybersecurity industry worldwide 2022, by educational level
- Impact experienced by security professionals because of the war in Ukraine 2022
- Kubernetes platforms used by organizations to orchestrate containers, 2024
- Confidential computing TAM share worldwide 2021-2026, by region
- CISO responsibility for operational technology cyber security 2022-2024
- Confidential computing TAM share worldwide 2021-2026, by technology segment
- Confidential computing TAM worldwide 2021-2026, by scenario
- Global organizations choice of open source tools for Kubernetes security 2024
- Global organizations container strategy concerns 2024
- Frequency of delayed application deployments due to Kubernetes Security, global 2024
- Global malware masqueraded as online collaboration applications 2020, by application
- Global surveillance technology market size 2022-2027
- DDoS attack destinations on Azure infrastructure worldwide 2021, by region
- Share of DDoS attacks on Microsoft Azure infrastructure worldwide H2 2021, by vector
- Share of DDoS attacks on Microsoft Azure infrastructure worldwide 2021, by duration
- Giesecke+Devrient net sales 2018-2022, by segment
- Giesecke+Devrient net sales 2018-2022
- CISOs who agree with their board on the issue of cybersecurity 2023, by industry
- Number of venture-backed companies acquired in cyber security worldwide 2016-2021
- Main skills gaps among cybersecurity teams worldwide 2023
- Companies' cybersecurity staffing worldwide in 2023
- Companies' threat outlook 2023, by reportable incidents
- Skill gaps among cybersecurity personnel worldwide 2023
- Soft skills needed by security professionals worldwide 2023
- CISOs that say more cyberattacks have occurred with remote working 2022, by country
- Time to fill a cyber security position in companies worldwide by level 2023
- Main priorities for companies' IT security departments worldwide 2023
- Skills gaps among recent university graduates worldwide 2023
- Cyber risk assessment challenges worldwide 2023
- Factors for resigning from cybersecurity job worldwide in 2023
- University degree requirement for jobs in cybersecurity worldwide 2022, by region
- Global security areas where professional training is required 2023
- Future hiring demand in cybersecurity worldwide 2023, by type of job
- Readiness of cybersecurity graduates for work worldwide in 2023
- Global companies' actions to mitigate cybersecurity risks 2022
- Factors determining qualification for a cybersecurity job worldwide in 2023
- Median deal value of M&A deals in cyber security 2018-2022
- Number and value of M&A deals 2018-2022, by quarter
- Reasons why professionals worldwide originally entered the cybersecurity sector 2023
- Global expected change in cybersecurity staffing levels 2020-2022
- Value of M&A deals in cyber security worldwide 2018-2022, by type
- Global cyber security budget increase 2016-2023
- CISOs that believe human error is biggest cyber vulnerability 2023, by country
- Critical cybersecurity areas worldwide 2022-2023
- Global identity and management (IAM) data captured about users 2021
- Main security skills worldwide 2023
- Global companies' cyber security accomplishments achieved in 2022
- Botnet - distribution of infections
- Global security spending on integrated risk management 2017-2023
- Share of online threats to audio-video devices worldwide 2023, by brand
- Roles responsible for remediating SaaS security misconfigurations worldwide 2022
- Methods for monitoring SaaS security configurations worldwide 2022
- Areas of concern related to SaaS security misconfigurations worldwide 2022
- Time needed to fix SaaS security misconfigurations worldwide 2022
- NortonLifeLock: net revenue 2012-2023, by region
- Average cost of a data breach by security automation level in global companies 2024
- Infection rate for Windows operating systems 2011
- Computer virus - infection rate of selected countries
- Average cost of a data breach by security automation level in global companies 2023
- Security vulnerabilities: internet attacks on client and server
- Usage of blockchain security solutions worldwide 2018 and 2019