Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Big data

Below you will find reports with the tag of “Big data”

image from Automate The Hunt

Automate The Hunt

This paper provides insight into the tools an IT security pro needs to rapidly hunt, find and investigate dynamic threat indicators. (more available)
Added: December 29, 2018
image from European Technology Index 2018: Is The Era Of The Technology Wild West Over?

European Technology Index 2018: Is The Era Of The Technology Wild West Over?

This is DLA Piper’s fourth Tech Index study into the perceptions and attitudes of European technology growth. As ever, we review how attitudes are changing with regard to market developments, shifts in the financial regulatory landscape and government policies designed to spur business innovation in an increasingly uncertain and disruptive world. (more available)
Added: December 14, 2018
image from Advancing the Science of Collaborative Problem Solving

Advancing the Science of Collaborative Problem Solving

This paper presents the research that discusses the findings of a recent global test regarding the preparedness of individuals entering the workforce, to participate in collaborative problem solving. (more available)
Added: December 5, 2018
image from The Pulse Report 2018

The Pulse Report 2018

This report provides an international study of senior management attitudes to leadership development and executive education. It also provides insight into cybersecurity related issues. (more available)
Added: November 28, 2018
image from What The Internet Of Things Means For Consumer Privacy

What The Internet Of Things Means For Consumer Privacy

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies. (more available)
Added: November 24, 2018
image from Understanding And Managing Identity In The Digital Era

Understanding And Managing Identity In The Digital Era

Almost every individual and every business now has a cyberpresence that needs to be secured. Digital transformation has also created a growing supply of security targets in the form of information-rich storehouses of data. (more available)
Added: November 24, 2018
image from Top Of Mind For Top U.S. Health Systems 2018

Top Of Mind For Top U.S. Health Systems 2018

To provide insight into some of the top trends in health IT, the Center for Connected Medicine partnered with The Health Management Academy to survey C-suite health system executives on health IT priorities for 2018. (more available)
Added: November 23, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study: 2018

LexisNexis Risk Solutions Fraud Mitigation Study: 2018

Since 2015, LexisNexis Risk Solutions has administered an annual study to determine the extent to which fraud cases span multiple industries. (more available)
Added: November 23, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study:2017

LexisNexis Risk Solutions Fraud Mitigation Study:2017

From the report, “Fraud from stolen identities or cyber attacks/hacking were the types of fraud most concerning to fraud mitigation professionals. (more available)
Added: November 23, 2018
image from Build Pervasive Cyber Resilience Now

Build Pervasive Cyber Resilience Now

This report posits that “Companies are racing into the digital future adopting technology enabled operating and business models that drive bottom- and top- line growth. (more available)
Added: November 21, 2018
image from Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

This report offers insight into the Iranian threat agent Greenbug.
Added: November 15, 2018
image from China's Cyber Superpower Strategy: Implementation, Internet Freedom Implications, and U.S. Responses

China's Cyber Superpower Strategy: Implementation, Internet Freedom Implications, and U.S. Responses

This report is a transcript of written Testimony provided to the House Comittee on Oversight and Government Reform, Subcomittee on Information Technology, by Sarah Cook Senior Research analyst for East Asia and China Media Bulletin Director. (more available)
Added: November 6, 2018
image from The Key Things Your Whole Business Needs To Know To Be GDPR Ready

The Key Things Your Whole Business Needs To Know To Be GDPR Ready

This paper asks 5 key questions that should help your organization know what to do with their data and GDPR compliance. (more available)
Added: October 26, 2018
image from 2015 Insider Threat Report

2015 Insider Threat Report

Based on survey responses from more than 800 senior business managers and IT professionals in major global markets, the global edition of this report provides present-day insight an opinion not the host of data breach threats that enterprise organizations face on a daily basis. (more available)
Added: October 25, 2018
image from Enhancing Services And Protecting Data For State And Local Governments

Enhancing Services And Protecting Data For State And Local Governments

From the report, “The state and local government sectors often find themselves understaffed and underfunded to utilize technology to its fullest potential. (more available)
Added: October 24, 2018
image from Russian Federation Country Profile 2017

Russian Federation Country Profile 2017

This paper gives a profile of the Russian Federation.
Added: October 24, 2018
image from The Internet Of Things Requires A Security Rethink

The Internet Of Things Requires A Security Rethink

This paper takes a good look at the new era that is being ushered in by the Internet Of Things. It discusses the “perfect storm” that is being created by the issues and innovations ahead. (more available)
Added: October 24, 2018
image from Exploring Strategic Risk

Exploring Strategic Risk

This paper discusses the strategic risks facing coroporations today.
Added: October 23, 2018
image from Six Strategies To Strengthen Your Company's Digital DNA

Six Strategies To Strengthen Your Company's Digital DNA

Digital transformation is a journey, not a destination. And every journey has a starting point. What you do next depends on where you begin. (more available)
Added: October 23, 2018
image from 2018 Connectivity Benchmark Report

2018 Connectivity Benchmark Report

This report, which benchmarks how IT decision makers are handling digital transformation, IT operations, and change management, takes an in-depth look at where organizations are on their digital journey and uncovers the challenges they face when integrating new and existing technologies. (more available)
Added: October 22, 2018
image from Know Your Data To Create Actionable Policy

Know Your Data To Create Actionable Policy

Too often, security and risk (S&R) leaders create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data — from what data they have to where it resides. (more available)
Added: October 22, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 00:08 UTC (build 051771c)