Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from Overcoming GDPR Compliance Challenges

Overcoming GDPR Compliance Challenges

This report introduces GDPR and the challenges that are involved and then discusses measures that organisations can take in order to boost their data protection capabilities. It also looks at the pitfalls to avoid as they can derail the overall programme. It is intended for those organisations that are working down the path to compliance and that are looking for guidance in how compliance can be achieved.

(more available)
Added: October 19, 2018
image from Path To MSSP

Path To MSSP

This whitepaper seeks to provide clarity over what “managed security service provider” status means, and whether customers are even concerned about it.

(more available)
Added: October 19, 2018
image from Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Ever since the new European regulation on the protection of personal data (GDPR) was voted in, businesses have started their countdown to the transition that will take place in May 2018. They now have less than 2 years to comply with the new European regulation and the consequences of its new requirements in terms of data protection: strengthened cybersecurity, liability of data collection entities and new mandatory procedures. For organizations, what this entails now is the need to review their procedures and ensure their regulatory compliance before it starts raining sanctions.This white paper aims to address the question by providing a simplified interpretation of the regulation and practical solutions for a smooth transition.

(more available)
Added: October 19, 2018
image from Post-Soviet Bank Heists

Post-Soviet Bank Heists

This report takes a look at recent bank heists that originated from Post-Soviet states.

Added: October 19, 2018
image from Securing Health Data In A BYOD World

Securing Health Data In A BYOD World

Health Organizations are increasinly using BYOD to adminster care in their facilities. With this technological advancement comes major security concerns. This paper looks at those issues and discusses what can be done to protect Health Data.

(more available)
Added: October 19, 2018
image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from Security Strategies To Prepare For 5G & IoT

Security Strategies To Prepare For 5G & IoT

In the third quarter of 2017, Heavy Reading, in conjunction with A10 Networks, undertook the creation and execution of a global survey designed to assess cloud, premises, and hybrid network security concerns and evaluate CSPs’ strategies to mitigate the risks of a threat curve on an upward trajectory. The key findings from the survey are documented in this white paper.

(more available)
Added: October 19, 2018
image from The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed organizations in Germany about their approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 19, 2018
image from The True Cost Of Compliance With Data Protection Regulations

The True Cost Of Compliance With Data Protection Regulations

Ponemon Institute and Globalscape conducted The True Cost of Compliance with Data Protection Regulations to determine the full economic impact of compliance activities for a representative sample of 53 multinational organizations. An earlier study was completed in 2011 and those findings are compared to this year’s results.

(more available)
Added: October 19, 2018
image from Transformational ‘smart cities’: cyber security and resilience

Transformational ‘smart cities’: cyber security and resilience

This report will explore the requirements and challenges of creating a secure, reliable and resilient smart city. It will consider how administrations and the overall city ecosystems will need to provide innovative, resilient ‘smart’ solutions that leverage digital information while protecting against malicious violations, unintentional damage and natural disasters.

(more available)
Added: October 19, 2018
image from Trends for 2015: Targeting the Corporate World

Trends for 2015: Targeting the Corporate World

The “Trends For 2015 – Targeting the Corporate World” report by the ESET LATAM Research Lab invites you to review some of the most significant cases that affected computer security in 2014, and to consider and present the challenges and threats expected for 2015. This report will try to address the different types of threats and security incidents we have witnessed during the year classified by catego- ry in order to answer the following questions: what will we find during 2015 in terms of IT security? And how, therefore, can companies and individual users prepare themselves to get through next year in safe- ty?

(more available)
Added: October 19, 2018
image from US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

This paper takes a look at the cities of the US, and the cyber threats that occurred there.

Added: October 19, 2018
image from 2015 State of Cybersecurity Leadership Report

2015 State of Cybersecurity Leadership Report

This paper was developed to help CISOs, CIOs, executive teams and boards of directors learn what they need to know to work together to address the challenges posed by cyber threats in the context of overall risk to the business.

(more available)
Added: October 18, 2018
image from 2016 Web Application Threat Trend Report

2016 Web Application Threat Trend Report

Readers are encouraged to use this report to get a better understanding of the current threat landscape, including trends specific to different contexts like region, time of day, industry, and more, in order to better fine-tune defenses for meeting the security needs of their unique environments.

(more available)
Added: October 18, 2018
image from 3 Steps To Mitigating Insider Threat Without Slowing Down Users

3 Steps To Mitigating Insider Threat Without Slowing Down Users

The point of this white paper is to teach folks how to leverage endpoint security to spot risk and free their users.

(more available)
Added: October 18, 2018
image from Are Your Employees A Cybersecurity Risk?

Are Your Employees A Cybersecurity Risk?

Today’s threat landscape is rapidly evolving, which means it is simply not enough for organizations to roll out an annual security training program and then pat themselves on the back for a job well done. Companies need to consistently invest in training and keep their employees updated on the latest vulnerabilities.

(more available)
Added: October 18, 2018
image from Behind our Digital Doors: Cybersecurity & the Connected Home

Behind our Digital Doors: Cybersecurity & the Connected Home

In support of National Cyber Security Awareness Month (October), ESET® and the National Cyber Security Alliance (NCSA) commissioned a survey to better understand the role of cybersecurity in the American household, providing an inside-look into how it is adapting in the digital era of the data breach. Given the simultaneous rise in our number of connected devices and cyber threats, this survey underlined the importance of cybersecurity as a core commitment in our digital lives. This paper discusses the findings of that survey.

(more available)
Added: October 18, 2018
image from Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

The aim of this paper is to establish a database on studies, articles and working papers on cyber risk and cyber risk insurance.Based on this, we provide insurance practitioners and academics a high-level overview of the main research topics and future research directions in the field.

(more available)
Added: October 18, 2018
image from Build Vs. Buy: Evaluating Identity Management

Build Vs. Buy: Evaluating Identity Management

Every corporation struggles with the decision to Build or Buy an identity management platform. This report seeks to offer advice to aid in that decision.

(more available)
Added: October 18, 2018
image from Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

In this study they characterize the extent to which cyber security incidents, such as those referenced by Verizon in its annual Data Breach Investigations Reports (DBIR), can be predicted based on externally observable prop- erties of an organization’s network.

(more available)
Added: October 18, 2018
image from Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

The article uses the world’s 1,000 largest companies as a sample to help us better understand the extent to which organizations are effected by cyber threats and how threat actors my be looking to exploit these credentials.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 38
  • 39
  • 40
  • 41
  • 42
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 12:08 UTC (build b1d7be4)