Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from Fine Determination

Fine Determination

This paper provides insight into specific fines that will occurr due to the GDPR.

Added: October 21, 2018
image from Guidelines For Increasing Public Sector Cybersecurity

Guidelines For Increasing Public Sector Cybersecurity

This paper discusses the issues that revolve around cybersecurity in the public sector.

Added: October 21, 2018
image from Health Warning: Cyberattacks Are Targeting The Healthcare Industry

Health Warning: Cyberattacks Are Targeting The Healthcare Industry

This research report is about theft in the healthcare industry. Specifically, it describes the marketplace for stolen healthcare industry data and examines the motivations for its theft.

(more available)
Added: October 21, 2018
image from How Boards of Directors Really Feel About Cyber Security Reports

How Boards of Directors Really Feel About Cyber Security Reports

This paper sets out to reveal if IT data reported to boards of directors, enables them to make good decisions.

(more available)
Added: October 21, 2018
image from How Cyber Threat Intelligence Safegaurds Against Today's Threat Landscape

How Cyber Threat Intelligence Safegaurds Against Today's Threat Landscape

This paper takes a look at Cyber Threat Intelligence.

Added: October 21, 2018
image from How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

This paper presents exclusive research into how chat platforms can be abused and become a cyber security weakness.

Added: October 21, 2018
image from Identity Theft In America

Identity Theft In America

This report provides an overlook at Identity Theft in America and how it can be prevented.

Added: October 21, 2018
image from Incident Response Survey 2017

Incident Response Survey 2017

From the report, “In the following pages, we examine the results of the survey in detail and offer guidelines and feedback on how our industry can continue to improve. The show must go on—but it is far from over.”

(more available)
Added: October 21, 2018
image from Innovation Insight For Unstructured Data Classification

Innovation Insight For Unstructured Data Classification

From the report, “The perpetually expanding volume and propagation of the unstructured data being stored and used by organizations is making information increasingly difficult to secure. Security and risk management leaders who implement data classification technologies will greatly enhance their chances of success.”

(more available)
Added: October 21, 2018
image from Microsoft As A Trusted Advisor And Partner On Cyber Resilience

Microsoft As A Trusted Advisor And Partner On Cyber Resilience

This whitepaper provides information about developing your organization’s cyber resiliance.

Added: October 21, 2018
image from New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business

New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business

This report provides insight into Australian Data Breach Protocol.

Added: October 21, 2018
image from New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

In August 2017, Cyber adAPT partnered with research and smart data firm Aberdeen Group to conduct a threat detection survey. The results provide critical data and the ability to analyze a variety of detection technology questions and scenarios.

(more available)
Added: October 21, 2018
image from Prevent Healthcare Data Breaches With Indentity Management

Prevent Healthcare Data Breaches With Indentity Management

Learn how Single Sign-On and identity management can be used for the healthcare industry. In 2016 alone, over 15 million medical records were stolen due to data breaches. The risks associated with security and identity management are higher in healthcare than any other industry.

(more available)
Added: October 21, 2018
image from Smartly Selected Infrastructure For GDPR Compliance

Smartly Selected Infrastructure For GDPR Compliance

This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance.

(more available)
Added: October 21, 2018
image from The Darknet Index: 2018 Black Hat Edition

The Darknet Index: 2018 Black Hat Edition

Notable declines in darknet exposure among black hat exhibitors, but does a risky darkint score correlate to share price performance?

(more available)
Added: October 21, 2018
image from The Life And Times Of Cybersecurity Professionals

The Life And Times Of Cybersecurity Professionals

This paper examines the life of those in the cybersecurity profession, and seeks to provide answers to the high turnover rate in the field.

(more available)
Added: October 21, 2018
image from The Value Of Data

The Value Of Data

This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place.

(more available)
Added: October 21, 2018
image from US Senate Subcomittee On Data Security And Bug Bounties

US Senate Subcomittee On Data Security And Bug Bounties

This is a transcript of a February 2018 US Senate meeting that discussed Data Security and the hacking community.

Added: October 21, 2018
image from Western Europe Security 2016 Predictions

Western Europe Security 2016 Predictions

A thorough infographic detailing predictions for the future of Western Europe Cyber security.

Added: October 21, 2018
image from 2015 Cyber Security Survey: Major Australian Businesses

2015 Cyber Security Survey: Major Australian Businesses

A report that was created by the 2015 Australian Cyber Security Centre (ACSC) Cyber Security Survey of major Australian businesses was conducted to obtain a better picture of Australian organisations’ understanding of cyber threats and how they are positioned to secure their networks.

(more available)
Added: October 20, 2018
image from 2016 Cost of Cyber Crime Study & the Risk of Business Innovation

2016 Cost of Cyber Crime Study & the Risk of Business Innovation

From the report, “Cyber attacks are a reality for all organizations. In this year’s cost of cyber crime research they focus on the importance of thriving and innovating while simultaneously reducing the financial and reputational consequences of a cyber attack. An important finding of this research is that a high security profile, as determined by the deployment of specific practices and technologies, will support business innovation and reduce the cost of cyber crime.”

(more available)
Added: October 20, 2018
  • ««
  • «
  • 35
  • 36
  • 37
  • 38
  • 39
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 20:08 UTC (build b1d7be4)