Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from The Economics Of Defense Security

The Economics Of Defense Security

This is a useful article that takes a look at the financial numbers of paying for a defensive strategy vs. paying for a breach. Perfect for accountants, and those who need to understand data from a purely financial side.

(more available)
Added: October 20, 2018
image from The Path To Rapid GDPR Compliance

The Path To Rapid GDPR Compliance

This white paper looks at some insights into the journey of reaching compliance with the GDPR and its May 2018 deadline. It seeks to share best practice guidelines for all businesses that have clients in Europe.

(more available)
Added: October 20, 2018
image from Threat Visibility And Cybersecurity Management

Threat Visibility And Cybersecurity Management

This paper seeks to discuss the weaknesses of cybersecurity management.

Added: October 20, 2018
image from VIGOR: Interactive Visual Exploration of Graph Query Results

VIGOR: Interactive Visual Exploration of Graph Query Results

This research takes a look at mining visual graphs and analyzes the value of that activity.

Added: October 20, 2018
image from 2016 Cost of Data Center Outages

2016 Cost of Data Center Outages

Previously published in 2010 and 2013, the purpose of this third study is to continue to analyze the cost behavior of unplanned data center outages. According to our new study, the average cost of a data center outage has steadily increased from $505,502 in 2010 to $740,357 today (or a 38 percent net change).

(more available)
Added: October 19, 2018
image from 2016 State of Security Operations

2016 State of Security Operations

In the State of Security Operations Maturity report, Hewlett Packard Enterprise provides updates to the capabilities, lessons learned, and performance levels of security operations based upon maturity assessments performed on a worldwide organizations.

(more available)
Added: October 19, 2018
image from 5 Ways To Strengthen Your SaaS Security And Build Customer Loyalty

5 Ways To Strengthen Your SaaS Security And Build Customer Loyalty

This is a 10 page guide that considers things that you can do to strengthen your SaaS security while not offending your customers.

(more available)
Added: October 19, 2018
image from 9 Realities Of Data Protection In The 21st Century

9 Realities Of Data Protection In The 21st Century

This paper discusses how a portable and persistent data protection model can enable your business.

Added: October 19, 2018
image from Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

From the report, “The Appthority Mobile Threat Team analyzed iOS apps in enterprise environments and found over 24,000 unique apps that access various types of user data, such as the calendar, bluetooth and photos, for advertising. These twenty-four thousand apps are just those that are up front with the user about requesting permission to access data for advertising purposes. Over 70% of enterprise environments contain these apps.”

(more available)
Added: October 19, 2018
image from Best Practices:Mitigating Insider Threats

Best Practices:Mitigating Insider Threats

From the report, “Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. it’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data in order to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. this report describes how to build an insider threat program.”

(more available)
Added: October 19, 2018
image from Business Perception Of IT Security: In The Face of An Inevitable Compromise

Business Perception Of IT Security: In The Face of An Inevitable Compromise

From The Report, “Evaluation of the business threat landscape can be broken down into two major areas: financial and technical. The former we covered extensively in our previous report, by measuring security budgets and recovery costs from typical threats. The next step is to take a closer look at real incidents that businesses have to deal with, and measures they take to prevent them.”

(more available)
Added: October 19, 2018
image from Cloud Security Defense: In Detail If Not In Depth

Cloud Security Defense: In Detail If Not In Depth

This report discusses the results of a survey conducted in 2017 to determine what information, concerns and security choices organizations are making with the cloud and the security of the cloud.

(more available)
Added: October 19, 2018
image from Control Business Data Risks Through End User Data Protection And Governance

Control Business Data Risks Through End User Data Protection And Governance

This Technology Spotlight examines the need for increased visibility and control to better manage and mitigate the risk presented by a decentralized corporate data environment.

(more available)
Added: October 19, 2018
image from Cyber Fears In Financial Services

Cyber Fears In Financial Services

The biggest takeaway from this report is that, for IT teams tasked with managing cybersecurity for financial networks is that the job is never done. Malicious actors will always be coming out of the woodwork, employing new and sometimes unexpected tactics to access funds and PII. IT teams therefore have to not only be vigilant, but keep the big picture in mind when mapping out their constantly- evolving network defenses by planning for tomorrow’s threats today.

(more available)
Added: October 19, 2018
image from Data Breach Quick View - 2015 Year End Data Breach Trends

Data Breach Quick View - 2015 Year End Data Breach Trends

This research will take a look at how the ransomware types work, not just from a technological point of view but also from a psychological viewpoint. This report will also look at how these threats evolved, what factors are at play to make ransomware the major problem that it is today, and where ransomware is likely to surface next.

(more available)
Added: October 19, 2018
image from Dell Security Annual Threat Report 2016

Dell Security Annual Threat Report 2016

This annual report aims to help organizations prevent attacks.

Added: October 19, 2018
image from ENISA Threat Landscape Report 2016

ENISA Threat Landscape Report 2016

In the following report, we give an overview of the top cyber-threats assessed in 2016. By concentrating more on the cyber-threats, ETL 2016 is more streamlined towards the details of cyber threats, while it provides information on threat agents and attack vectors. Based on this material, we deliver our conclusions for policy makers, businesses and research.

(more available)
Added: October 19, 2018
image from Five Reasons Why You Need Endpoint Backup

Five Reasons Why You Need Endpoint Backup

As its title states, this white paper provides five reasons why you need endpoint backup, specifically a centralized backup service.

(more available)
Added: October 19, 2018
image from Global Cyberspace Is Safer Than You Think

Global Cyberspace Is Safer Than You Think

This paper argues that the level of security in cyberspace is actually far better than the picture described by media accounts and IT security reports.

(more available)
Added: October 19, 2018
image from McAfee Labs Threat Report December 2017

McAfee Labs Threat Report December 2017

In this report, they highlight the statistics gathered by McAfee Labs in Q3 of 2017.

Added: October 19, 2018
image from Network Detection: What Is It Really?

Network Detection: What Is It Really?

This report seeks to help provide important information to clarify what cybersecurity organizations are truly offering.

Added: October 19, 2018
  • ««
  • «
  • 37
  • 38
  • 39
  • 40
  • 41
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 12:08 UTC (build b1d7be4)