Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from A Trident of Change in Europe: Understanding DSM, PSD2 & GDPR

A Trident of Change in Europe: Understanding DSM, PSD2 & GDPR

From the report, “The Digital Single Market, Revised Payment Services Directive and the General Data Protection Regulation are all complex and occasionally bewildering pieces of legislation, which aim to transform the European online market and improve services by promoting innovation. However, as they are yet to be fully implemented, organisations are understandably concerned about what they will look like in practice as opposed to on paper. Will global merchants from outside the region still be able to compete in Europe or will the new regulations be used as a form of protectionism? Will they fight fraud and chargebacks or unwittingly contribute to them? And how will Brexit – the unstable factor in the immediate future of the EU – impact all of this? As merchants and others wait in anticipation for the final stages of these three policy initiatives to take shape, The Chargeback Company is joined by contributors from ACI Worldwide and Kount to analyse the likely implications and opportunities for doing business in Europe from 2018.”

(more available)
Added: February 16, 2019
image from Solving The CNP False Decline Puzzle: Collaboration Is Key

Solving The CNP False Decline Puzzle: Collaboration Is Key

From the report, “The bottom line is that good customers who transact online are suffering a bad purchasing experience – and this is doubly harmful to both card issuers and merchants. Cardholders may elect to abandon a purchase altogether, seek a different online store to minimize purchase friction, or pull out a different card – sending their go-to card to the back of wallet. This paper explores the size of the problem, explains the destructive impact on customers who are wrongly turned away, delves into why transactions are declined and reveals how the industry currently manages declines from both a card issuer and merchant perspective. Finally, it presents some possible approaches to the problem, including several pilot programs that Ethoca currently has underway with card issuers and merchants.”

(more available)
Added: February 13, 2019
image from The Forter/MRC Fraud Attack Index

The Forter/MRC Fraud Attack Index

From the report, “The report also looks at the trends in the usage by fraudsters of specific methods or directions of attack (e.g. location manipulation, account takeover, etc.). This is to provide insight into the various techniques commonly employed by today’s savvy fraudster. The increased sophistication of the online criminal underworld, where a huge and connected marketplace exists to provide numerous services that make theft easier (and where stolen data can be found easily and cheaply following the massive data breaches of the last few years), means that fraudsters have direct access to the tools and information they need to commit online fraud. This has lowered the barrier to entry for new fraudsters to enter, and enabled experienced fraudsters to increase the scale, sophistication and speed of their attacks. This report is designed to reflect the current patterns in that scene and help merchants to understand further and prepare for the attacks they are seeing or are likely to face.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Lloyd's City Risk Index: Executive Summary

Lloyd's City Risk Index: Executive Summary

From the report, “The second Lloyd’s City Risk Index, based on original research by the Centre for Risk Studies at Cambridge University’s Judge Business School, details the risk landscape in the world’s leading 279 cities, responsible for 41% of global economic output in 2018. The data contained in this report will help policymakers, businesses and insurers make cities more resilient. Risk is managed most effectively by societies who anticipate and learn from each disruptive event, making the next generation safer.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Lloyds City Risk Index: Europe

Lloyds City Risk Index: Europe

This report summarizes Lloyd’s City Risk Index report for the cities of Europe.

Added: February 13, 2019
image from Global Fraud Attack Index: October 2016

Global Fraud Attack Index: October 2016

From the report, “Forter and PYMNTS.com have partnered to track, analyze and report on important fraud trends in the world of payments and online commerce. Every quarter, we monitor fraud attempts on U.S. merchant websites to give you the latest insights on what’s going on. (Note: For each of the Indexes in 2016, we’re using 2015’s fraud rates as a benchmark.) Our take-home this quarter: Fraud rates are climbing. They climbed last quarter and are still climbing this quarter. In fact, overall fraud rates have increased by 14 percent from last quarter to this quarter. To find out how fraudsters are doing it and what methods they favor, keep reading.” Read on to find out more.

(more available)
Added: February 13, 2019
image from 2016 The Forter/MRC Fraud Attack Index

2016 The Forter/MRC Fraud Attack Index

From the report, “Overall, 2016 saw a steady rise in online fraud attack rate, which increased 8.9% over the course of the year. The frightening “tsunami” of fraud attempts that many merchants experienced at the end of 2015 was not repeated, but the moderate rate of increase was sustained. For several industries, primarily apparel, digital goods and travel, 2016 was a year of dramatic fluctuations, affected by numerous fraudsters who were looking for new vulnerabilities they can exploit.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Profile of A Fraudster

Profile of A Fraudster

This report offers insight into 6 different fraud profiles in the online world.

Added: February 13, 2019
image from Fraud Attack Index Fifth Edition

Fraud Attack Index Fifth Edition

From the report, “As such, Forter creates a biannual Fraud Attack Index to highlight these changes as they affect e-commerce and mobile merchants and to provide anti-fraud professionals with the context they need to succeed. This report leverages Forter’s data to examine the trends in online fraud attacks across industries, comparing the different fraud experienced by different verticals. The report also looks at the prevalence of specific fraud methods or directions of attack (e.g. location manipulation, botnets, etc.). This is to provide insights into the various techniques commonly employed by today’s cunning fraudsters.” Read on to find out more.

(more available)
Added: February 13, 2019
image from The Future Is Now: Q1 2018 Fraud Trends Report

The Future Is Now: Q1 2018 Fraud Trends Report

From the report, “This report shares Feedzai’s original research. We found that fraudsters are attacking in methods that are faster and faster – and continuously new. The time horizon for the future of fraud has been shrinking. Today, the time horizon has shrunk to now. What does this new now look like?” Read on to find out more.

(more available)
Added: February 13, 2019
image from Behavioral Biometrics in a PSD2 World

Behavioral Biometrics in a PSD2 World

This report offers insight into the changes occurring in the financial services industry as relates to the revised Payment Services Directive (PSD2).

(more available)
Added: February 13, 2019
image from A Fresh Look At Security Analytics

A Fresh Look At Security Analytics

In an interview with Tom Field, senior vice president of editorial at Information Security Media Group, Gidwani discusses: • How security analytics is commonly used today; • The potential of automation; • How orchestration impacts efficiency and scale.

(more available)
Added: February 12, 2019
image from Applying The Diamond Model For Threat Intelligence To The Star Wars' Battle of Yavin

Applying The Diamond Model For Threat Intelligence To The Star Wars' Battle of Yavin

Using an important analogy from Star Wars, this report provides insight into threat intelligence. May the Force Be With You.

(more available)
Added: February 12, 2019
image from Cloud Security Trends: May 2018

Cloud Security Trends: May 2018

This report offers 14 tips to fortify your public cloud environment. From the report, “This edition of RedLock’s Cloud Security Trends marks the report’s one year anniversary, and it’s been a sobering year in terms of public cloud breaches, disclosures and attacks. This report highlights key learnings from these incidents along with research by the RedLock Cloud Security Intelligence (CSI) team to shed light on the trends that we can expect this year.”

(more available)
Added: February 12, 2019
image from Cisco 2018 Privacy Maturity Benchmark Study

Cisco 2018 Privacy Maturity Benchmark Study

The Cisco 2018 Privacy Maturity Benchmark Study was created in conjunction with Cisco’s Annual Cybersecurity Benchmark Study, a double-blind survey completed by more than 3600 security professional in 25 countries and across all major industries. The privacy specific questions focused on a subset of nearly 3000 respondents who were familiar with the privacy processes at their organizations. Participants were asked about the makeup of their privacy teams, maturity level of their privacy processes, and the impact (if any) they experienced related to delays in the sales cycle due to customer data privacy concerns. We also analyzed responses to other questions regarding cyber events to understand which organizations had been breached in the last year and the size of any losses from these events.

(more available)
Added: February 12, 2019
image from IBM Cybersecurity and Privacy Research

IBM Cybersecurity and Privacy Research

Some key headlines from this report include; A majority of the public is more concerned about cyber security that it was five years ago, A majority are confident that companies can protect their data and help in the wake of a breach, Most feel business’ focus on profits could negatively impact cybersecurity commitment. Read on for further insight.

(more available)
Added: February 12, 2019
image from The Cyber Resilience of Canadian Organizations

The Cyber Resilience of Canadian Organizations

Scalar’s study of the cyber resilience of Canadian organizations finds there is a new normal across the threat landscape. Cyber security incidents – whether they be exfiltration, infiltration, or denial of service – are now occurring on a regular basis. To address this, the focus of cyber security efforts is shifting from an emphasis on protection against attacks, to improving the detection of malicious actors on the network, and responding to and recovering from incidents as quickly as possible. The findings of the 2019 Scalar Security Study reflect on these new trends and introduce cyber resilience as a security theme that emphasizes the importance of business continuity and the need for organizations to return to normal operations and a trusted state after an incident has occurred

(more available)
Added: February 9, 2019
image from The Black Report: Decoding The Minds Of Hackers

The Black Report: Decoding The Minds Of Hackers

This unique report offers insight into the world of hackers. It seeks to stand apart from other annuals and quarterlies by presenting information other reports are not discussing.

(more available)
Added: February 9, 2019
image from The Black Report 2018: Decoding The Minds Of Hackers

The Black Report 2018: Decoding The Minds Of Hackers

From the report, “Before we begin the 2018 Black Report in earnest, it’s important to understand who our respondents are. Last year, we focused on people who referred to themselves as hackers or professional penetration testers. This year, we broadened our survey to include incident responders. These guys deal first-hand with hackers and the aftermath of data breaches. And as you’ll see, their perspective provided a tremendously valuable contribution to the results of the survey.” Read on to find out more.

(more available)
Added: February 9, 2019
image from Changing Data Breach Notification Laws: Regulatory Trends

Changing Data Breach Notification Laws: Regulatory Trends

From the report, “Analyzing this flurry of legislative activity in 2018, we have identified a number of continuing trends. In general, the overarching trend is increasing stringency and growing complexity in breach notification obligations. In the following pages, we’ll break down this overarching trend into separate and distinct trends. We’ll also look at what these trends mean for how privacy and security professionals work today.”

(more available)
Added: February 9, 2019
image from National Exposure Index 2018

National Exposure Index 2018

In 2016, Rapid7 Labs launched the National Exposure Index in order to get a measurable, quantitative answer to a fairly fundamental question: What is the nature of internet exposure—services that either do not offer modern cryptographic protection, or are otherwise unsuitable to offer on the increasingly hostile internet—and where, physically, are these exposed services located? Now in our third year, we continue this ongoing investigation into the risk of passive eavesdropping and active attack on the internet, and offer insight into the continuing changes involving these exposed services. We’ve also added a third dimension for exposure, “amplification potential,” in the wake of the disastrous memcached exposure uncovered in 2018.

(more available)
Added: February 9, 2019
  • ««
  • «
  • 20
  • 21
  • 22
  • 23
  • 24
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 20:12 UTC (build 0d9043b)