Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from Cyber Pulse:The State of Cybersecurity in Healthcare

Cyber Pulse:The State of Cybersecurity in Healthcare

To gain insight into what’s happening in the healthcare industry when it comes to cybersecurity, Kaspersky Lab issued a survey. The research provides insight into the perceptions of healthcare employees in North America regarding cybersecurity in their workplace, including awareness of cybersecurity breaches, protection of sensitive information, cybersecurity awareness and training, and more. Kaspersky Lab commissioned the research firm Opinion Matters to conduct a survey of 1,758 employees based in healthcare organizations in the United States and Canada. Through this research, the company aims to create a dialogue among businesses and IT staff in healthcare about the current state of awareness of cybersecurity among their employees, along with providing suggested proactive steps that can be taken to prioritize cybersecurity awareness through trainings and consistent education, aiming to prevent or minimize the next cybersecurity issue.

(more available)
Added: January 15, 2019
image from Insider's Guide To Incident Response: Expert Tips

Insider's Guide To Incident Response: Expert Tips

From the report, “The fight to protect your company’s data isn’t for the faint of heart. As an embattled IT warrior, with more systems, apps, and users to support than ever before, keeping everything up and running is a battle in itself. When it comes to preventing the worst-case scenario from happening, you need all the help you can get, despite your super-hero status. That’s why we’ve developed this incident response guide. We’ve collected and curated decades of infosec war stories and intelligence — from across the galaxy — so that you’re better armed in the fight against cybercrime. You’ll have an insider’s perspective on how to build an incident response plan and team, and what tools and training you can use to arm those team members.”

(more available)
Added: January 15, 2019
image from A House Divided: The Cost of Dysfunction Between Network & Cybersecurity Teams

A House Divided: The Cost of Dysfunction Between Network & Cybersecurity Teams

From the Report, “A new study by IDG shows 86% of organizations have suffered repercussions, including increased security breaches and data loss, due to lack of collaboration between Network & Cybersecurity teams.”

(more available)
Added: January 15, 2019
image from The Rise Of Machine Learning In Cybersecurity

The Rise Of Machine Learning In Cybersecurity

The purpose of this white paper is to help users understand how CrowdStrike ® uses ML to protect endpoints. To get there, we must first clarify what ML is and how it works. Then we will describe how Crowdstrike implements ML, specifically in the area of malware detection. Finally, we will discuss the benefits and limitations of applying ML in cybersecurity. In the end, the reader will get a better understanding of ML and how — when used correctly — it can help defend against cyber threats.

(more available)
Added: January 1, 2019
image from Indicators of Attack Versus Indicators of Compromise

Indicators of Attack Versus Indicators of Compromise

Based on extensive use of CrowdStrike’s next generation endpoint protection platform to detect and prevent sophisticated attacks against large organizations, CrowdStrike’s in house team of security experts, adversary hunters, intelligence analysts and incident responders have pooled their knowledge to produce this valuable guidebook and checklist for proactively enhancing your corporate information security procedures while avoiding common mistakes and pitfalls.

(more available)
Added: January 1, 2019
image from 5 Reasons Endpoint Security Must Move To The Cloud

5 Reasons Endpoint Security Must Move To The Cloud

This brief whitepaper offers some thoughts on why endpoint security should move to the cloud.

Added: January 1, 2019
image from Cyber Attack Survival Checklist

Cyber Attack Survival Checklist

This report offers a checklist for surviving a Cyber Attack.

Added: January 1, 2019
image from Cybersecurity During A Merger

Cybersecurity During A Merger

Cybersecurity has emerged as a key risk factor to be weighed during the due diligence process of any merger and acquisition. How should organizations on both sides approach the process? Steve Chabinsky of CrowdStrike shares his thoughts on strategy for assessing cyber risk during the M&A due diligence process.

(more available)
Added: January 1, 2019
image from Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

The big-name breaches have made us all sensitive to the loss of personal and competitive data. But are we overlooking the real risks? Shawn Henry of Crowdstrike offers insight on how we need to evolve our core defenses.

(more available)
Added: January 1, 2019
image from Beyond Malware: Detecting The Undetectable

Beyond Malware: Detecting The Undetectable

This report discusses a key issue in a Malware-centric defense approach; it will leave you vulnerable to attacks that don’t leverage malware. Read on to learn more.

(more available)
Added: January 1, 2019
image from Why Managed Threat Hunting?

Why Managed Threat Hunting?

This report offers insight into threat hunting. It specifically focusses on the “Human Detection Engine.”

Added: January 1, 2019
image from Hacking, Escalating Attacks And The Role Of Threat Hunting

Hacking, Escalating Attacks And The Role Of Threat Hunting

This research was conducted to understand the challenges and issues facing UK businesses right now in their fight against cybercrime including hacking, malicious attacks, and breaches, and to scope how organisations are using threat hunting to strengthen their defences.

(more available)
Added: January 1, 2019
image from Telstra Security Report 2018

Telstra Security Report 2018

This report offers an analysis of may of the significant cyber security events of 2017.

Added: January 1, 2019
image from Security Is A Big Data Problem - It Belongs In The Cloud

Security Is A Big Data Problem - It Belongs In The Cloud

This white paper seeks to explore more fully how traditional AV has had its day, and how the principles of big data are now applicable to both detecting and preventing IT security threats.

(more available)
Added: January 1, 2019
image from Outsmarting the Smart: Entering The Age of Threat Hunting

Outsmarting the Smart: Entering The Age of Threat Hunting

This report provides insight into threat hunting and the challenge of returning the balance of power for security from the attackers to the defenders.

(more available)
Added: January 1, 2019
image from Missing Critical Patches: A Cybersecurity Epidemic

Missing Critical Patches: A Cybersecurity Epidemic

From the report, “IT security leaders know their companies’ endpoints, PCs, and servers are continuously targeted by hackers. They also agree following best practices in endpoint security hygiene is instrumental in reducing cyber incidents. However, our 2017 survey of IT security leaders points to a situation where most are concerned about their actual practices in endpoint security hygiene. Fortunately, most also acknowledge they need to improve. When it comes to identifying their top priorities, IT security leaders are clear: they want to reduce the frequency and severity of data breaches; streamline regulatory compliance; and maintain business continuity. When it comes to identifying and executing upon the security hygiene best practices required to deliver on these priorities, things begin to get murky. Our 2017 survey of IT security leaders reveals a situation in which most respondents express concern about their security hygiene practices and waning confidence in the ability of existing tools to help them improve. Read on for more about what we learned, plus five recommended action items you can take today to address these issues.”

(more available)
Added: December 29, 2018
image from The Need For Speed

The Need For Speed

This paper seeks to provide a new approach to cyber security that enables IT operations and incident response teams to move faster and act smarter.

(more available)
Added: December 29, 2018
image from Automate The Hunt

Automate The Hunt

This paper provides insight into the tools an IT security pro needs to rapidly hunt, find and investigate dynamic threat indicators.

(more available)
Added: December 29, 2018
image from How Tanium helps address the CIS Critical Security Controls/SANS Top 20

How Tanium helps address the CIS Critical Security Controls/SANS Top 20

This paper provides a checklist to address CIS Critical Security Controls.

Added: December 29, 2018
image from Measuring & Managing the Cyber Risks to Business Operations

Measuring & Managing the Cyber Risks to Business Operations

Measuring & Managing the Cyber Risks to Business Operations, which was sponsored by Tenable and conducted by Ponemon Institute, reveals global trends in how organizations are assessing and addressing cybersecurity risks. We conclude from the findings that current approaches to understanding cyber risks to business operations are failing to help organizations minimize and mitigate threats. We surveyed 2,410 IT and IT security practitioners in the United States, United Kingdom, Germany, Australia, Mexico and Japan. All respondents have involvement in the evaluation and/or management of investments in cybersecurity solutions within their organizations. The consolidated global findings are presented in this report.

(more available)
Added: December 14, 2018
image from Too Much Information

Too Much Information

In this research, Digital Shadows assessed the sensitive data exposed from some of the most ubiquitous file sharing services across the Internet. We found over twelve petabytes of publicly available data across open Amazon S3 buckets, rsync, SMB, FTP servers, misconfigured websites, and NAS drives.

(more available)
Added: December 5, 2018
  • ««
  • «
  • 23
  • 24
  • 25
  • 26
  • 27
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 00:12 UTC (build 0d9043b)