Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from United Kingdom - Views From The C-Suite Survery 2018

United Kingdom - Views From The C-Suite Survery 2018

All available industry statistics show that cybersecurity attacks and breaches continue to rise—so how prepared are UK companies to manage cyberattacks? In this survey we asked organisations about their plans for investment and about how well they think they are managing cyber risk.

(more available)
Added: October 17, 2018
image from 2016 Data Breach Industry Forecast

2016 Data Breach Industry Forecast

To help organizations prepare for what lies ahead and ensure incident response plans are ready for the evolving data breach environment, Experian Data Breach Resolution has outlined five predictions for what we can expect in 2016.

(more available)
Added: October 16, 2018
image from 2016 Shadow Data Report

2016 Shadow Data Report

The Shadow Data Report published by Elastica CloudThreat Labs, addresses key trends and challenges facedby enterprises securing data stored and shared via cloudapps and services.

(more available)
Added: October 16, 2018
image from 2016 State Of Privacy & Security Awareness

2016 State Of Privacy & Security Awareness

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 16, 2018
image from 2017 Phishing Response Trends UK Region

2017 Phishing Response Trends UK Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 16, 2018
image from A Clearer View of Emerging Risks: Emerging Risks Report 2015

A Clearer View of Emerging Risks: Emerging Risks Report 2015

In this report, they examine four key areas where risks continue to emerge or, perhaps, more importantly, contain elements where the risks are unknown at this time: a) Cyber, b) Life, health and longevity, c) New Technologies, d)casualty catastrophe reserving.

(more available)
Added: October 16, 2018
image from A Quick History Of IoT Botnets

A Quick History Of IoT Botnets

Here is a short report on the history of IoT Botnets.

Added: October 16, 2018
image from An Emprical Analysis of Cyber Security Incidents at a Large Organization

An Emprical Analysis of Cyber Security Incidents at a Large Organization

This is a study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer.

(more available)
Added: October 16, 2018
image from Balancing Security and Accessibility with Compliance in the Healthcare Sector

Balancing Security and Accessibility with Compliance in the Healthcare Sector

This white paper presents some interesting information related to the cybersecurity issues that can occur in the healthcare sector.

Added: October 16, 2018
image from Benefits And Costs Of Alternate Cyber Futures

Benefits And Costs Of Alternate Cyber Futures

This report seeks to answer the following questions, In 2030, will the Internet and related information and communications technologies (ICT) continue to drive global innovation and prosperity? Or, will that bright promise be swamped by an unstable and insecure Internet, so overwhelmed by non-stop attacks that it has become an increasing drag on economic growth?

(more available)
Added: October 16, 2018
image from Cyber Risk: Threat and Opportunity

Cyber Risk: Threat and Opportunity

The executive summary of this paper gives four points of discussion: a) Interest in cyber insurance has grown beyond expectations b) Cyber attacks and breaches have grown in frequency, and loss costs are on the rise c) Insurers are issuing an increasing number of cyber insurance policies and becoming more skilled and experienced at underwriting and pricing this rapidly evolving risk d) Some observers believe that cyber exposure is greater than the insurance industry’s ability to adequately underwrite the risk.

(more available)
Added: October 16, 2018
image from Cybercrime And Other Threats Faced By The Healthcare Industry

Cybercrime And Other Threats Faced By The Healthcare Industry

In this paper they discuss several aspects of the healthcare threat surface.

Added: October 16, 2018
image from Cybersecurity In Financial Services

Cybersecurity In Financial Services

This Paper provides a breakdown of New York’s 23 NYCRR500 Financial Security requirements.

Added: October 16, 2018
image from Damage Control: The Cost of Security Breaches

Damage Control: The Cost of Security Breaches

From the report, “Although real damages can be very different from our average estimation, in this report we’ve made a unique attempt to connect potential risks and real consequences of a security breach, defined in dollars, not gigabytes of data and hours of downtime.”

(more available)
Added: October 16, 2018
image from Estimating The Global Cost Of Cyber Risk: Methodology And Examples

Estimating The Global Cost Of Cyber Risk: Methodology And Examples

The goal of this research was to produce a transparent methodology for estimating present and future global costs of cyber risk, acknowledging the considerable uncertainty in the frequencies and costs of cyber incidents.

(more available)
Added: October 16, 2018
image from Executive Briefing Series: Mobile Cyber Security

Executive Briefing Series: Mobile Cyber Security

This is a brief introduction to Mobile Cyber Security

Added: October 16, 2018
image from GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 16, 2018
image from Growing Disaster Recovery Needs Change the Role of Data Backup

Growing Disaster Recovery Needs Change the Role of Data Backup

Data protection in the form of backup and recovery remains one of the key tools in a company’s disaster recovery/business continuity toolbox. However, the increasing adoption of cloud-based IT options has also added a new set of challenges for managing and protecting business processes that can extend beyond the datacenter. There’s an increasing need for contingency plans that address the potential loss of mission-critical services, as well as the applications and data itself.

(more available)
Added: October 16, 2018
image from Hacking Back Without Cracking Up

Hacking Back Without Cracking Up

From the paper, “This paper aims, in the first place, to put a concrete proposal on the table. It is not a panacea; it is a plausible way forward. We will start by explaining our proposal in detail and the problems we believe it would solve. We then discuss the proposal’s strategic rationale at a higher level, how it compares to various past and current practices, and why concerns about the dangers are considerably exaggerated. We conclude by considering the specific legal changes the proposal would require.”

(more available)
Added: October 16, 2018
image from HIPAA & The Enterprise Network

HIPAA & The Enterprise Network

This whitepaper will explore HIPAA requirements and how comprehensive network security automation and orchestration will control endpoints, provide total visibility of all network access devices and automate threat response to help ensure compliance.

(more available)
Added: October 16, 2018
image from Internet Crime Report 2016

Internet Crime Report 2016

The 2016 Internet _x0012_Crime Report highlights the I_x0012_3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), ransomware, tech support fraud, and extortion. In 2016, IC3 received a total of 298,728 complaints with reported losses in excess of $1.3 billion.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 41
  • 42
  • 43
  • 44
  • 45
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 04:08 UTC (build b1d7be4)