Identification & Authentication | Mature | Low | 2.4 | 2.4 | 8 | 2008 | 34 | 3 | 10 |
Authorization & Access Control | Mature | Low | 2.4 | 2.4 | 8 | 24397 | 30 | 11 | 7 |
Firewalls | Established | Low | 2.6 | 2.4 | 8 | 4655 | 29 | 6 | 10 |
Cyber range | Mature | Low | 2.4 | 2.2 | 9 | 80 | 91 | 12 | 37 |
Encryption | Established | Low | 2.6 | 2.6 | 10 | 35443 | 49 | 325 | 13 |
Certification | Established | Low | 2.8 | 2.4 | 5 | 410 | 30 | 1 | 13 |
Endpoint Security | Mature | Low | 2.2 | 2 | 9 | 3524 | 57 | 68 | 11 |
Mobile & IoT Security | Mature | Low | 2.2 | 2.4 | 12 | 14176 | 66 | 1602 | 5 |
Cloud and virtualization security | Outdated | Low | 2 | 1.6 | 8 | 4760 | 56 | 71 | 7 |
Vulnerability management | Mature | Medium | 2 | 2.4 | 15 | 296 | 60 | 8 | 11 |
Malware analysis | Mature | Low | 2.6 | 1.8 | 5 | 807 | 60 | 15 | 9 |
Hardware security | Established | Low | 2.8 | 2.2 | 12 | 4056 | 80 | 250 | 9 |
Intrusion Prevention/Detection Systems (IDS/IPS) | Mature | Low | 2.2 | 2.2 | 14 | 14085 | 31 | 35 | 11 |
Cyber threat Intelligence | Mature | Medium | 1.8 | 2.4 | 17 | 100 | 97 | 20 | 23 |
Honeypots | Outdated | Low | 1.6 | 1.4 | 6 | 653 | 44 | 4 | 12 |
Security Operations | Emerging | Medium | 1.8 | 2.2 | 14 | 1397 | 43 | 5 | 8 |
Risk assessment & management | Mature | High | 2.2 | 2.4 | 10 | 242 | 67 | 11 | 17 |
Compliance and assurance | Established | High | 2.6 | 2.4 | 13 | 154 | 69 | 7 | 12 |
Secure software development | Established | High | 2.6 | 2.4 | 9 | 393 | 48 | 4 | 13 |
Forensic analysis | Mature | Low | 2.2 | 2 | 14 | 119 | 50 | 3 | 14 |
DoS Protection | Mature | Low | 2.2 | 2 | 6 | 1774 | 44 | 16 | 17 |
Cyber resilience | Established | Medium | 2.4 | 2.4 | 9 | 2513 | 42 | 15 | 9 |
Open Source Intelligence (OSINT)/ Private Intelligence (PRIVINT) | Emerging | Low | 1.8 | 2.2 | 1 | 134 | 51 | 3 | 21 |
Penetration Testing / Red Teaming | Emerging | Low | 2 | 1.8 | 4 | 446 | 55 | 6 | 11 |