Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from Security Privacy And The Next Generation Workforce

Security Privacy And The Next Generation Workforce

Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace.

(more available)
Added: October 15, 2018
image from Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

The Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data reveals that the majority of healthcare organizations represented in this study have experienced multiple data breaches. Despite the increased frequency of breaches, the study found that many organizations lack the money and resources to manage data breaches caused by evolving cyber threats, preventable mistakes, and other dangers.

(more available)
Added: October 15, 2018
image from Spear Phishing Report

Spear Phishing Report

This report takes a very deep look at the subject of Spear Phishing and the impact it is having on business.

(more available)
Added: October 15, 2018
image from Suspected Chinese Syber Espionage Group TEMP.Periscope Targeting U.S. Engineering and Maritime Industries

Suspected Chinese Syber Espionage Group TEMP.Periscope Targeting U.S. Engineering and Maritime Industries

This blog post takes a look at a specific Chinese threat that is impacting Engineering and Maritime corporations.

Added: October 15, 2018
image from The Cloud Balancing Act for IT: Between Promise and Peril

The Cloud Balancing Act for IT: Between Promise and Peril

This paper is put together by a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.

(more available)
Added: October 15, 2018
image from The Danger Within: Unmasking Insider Threats

The Danger Within: Unmasking Insider Threats

This eBook outlines the who, what, why and how of the insider threat to expose risks you may not be considering, and provides guidance to help you prevent and detect these costly attacks.

(more available)
Added: October 15, 2018
image from The GDPR:Key Themes And Challenges

The GDPR:Key Themes And Challenges

This helpful report provides analysis of the GDPR, some misconceptions, and some helpful tips for becoming compliant.

Added: October 15, 2018
image from The Global State Of Online Digital Trust

The Global State Of Online Digital Trust

The digital trust perception gap, and other findings in this ground-breaking study, highlight the need for business leaders to understand how much consumers trust organizations, what drives digital trust, and the business impact of losing that trust.

(more available)
Added: October 15, 2018
image from The State of Malware Detection & Prevention

The State of Malware Detection & Prevention

From the report, “We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks.”

(more available)
Added: October 15, 2018
image from Threat Report

Threat Report

Advice in this report ranges from the tactical to the strategic. Recognize the importance of solutions that can provide specific benefits yet work as part of a unified security posture. They claim that their security recommendations will provide actionable information and guidance, while taking into account the need for organizations to grow and innovate at the same time.

(more available)
Added: October 15, 2018
image from White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime.

(more available)
Added: October 15, 2018
image from Why K-12 Cybersecurity Involves More Than Just CIPA Compliance

Why K-12 Cybersecurity Involves More Than Just CIPA Compliance

Cybersecurity is one of many considerations teachers now juggle as they seek to get the most out of digital transformation in the classroom. But when the weight of assuring cybersecurity conflicts with the litany of everyday issues that teachers are faced with on campus, enforcing digital best practices often falls by the wayside.

(more available)
Added: October 15, 2018
image from 2015 Internet Crime Report

2015 Internet Crime Report

The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS).

(more available)
Added: October 14, 2018
image from 2016 Midmarket Threat Summary Report

2016 Midmarket Threat Summary Report

This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats.

(more available)
Added: October 14, 2018
image from 2016 State Of Privacy & Security Awareness: The Story Behind The Story

2016 State Of Privacy & Security Awareness: The Story Behind The Story

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 14, 2018
image from 2016 State of the Endpoint Report

2016 State of the Endpoint Report

This annual study is conducted by Ponemon Institute to understand trends and changes in endpoint risk in organizations. An endpoint can include servers, desktops, laptops, smartphones, and even printers, ATMs and PoS devices. They surveyed 694 US IT and IT security practitioners who are involved in endpoint security in a variety of organizations.

(more available)
Added: October 14, 2018
image from 2017 Data Threat Report Global Edition

2017 Data Threat Report Global Edition

This report from 2017 is based on a survey conducted during October and November of 2016. They surveyed over a thousand senior security executives from across the globe, including from key regional markets in the US, UK, Germany, Japan, Australia, Brazil, and Mexico, and key segments such as federal government, retail, finance, and healthcare.

(more available)
Added: October 14, 2018
image from 2017 Phishing Response Trends Singapore Region

2017 Phishing Response Trends Singapore Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 14, 2018
image from A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

This paper discusses how the GDPR will affect you as a non-European company and provides insights into what you should do to prepare.

(more available)
Added: October 14, 2018
image from Android Is Ready For The Enterprise

Android Is Ready For The Enterprise

This report offers insight into Android and its use in the modern enterprise.

Added: October 14, 2018
image from Beginner's Guide To Encryption

Beginner's Guide To Encryption

Device Authority’s Beginners’ Guide to Encryption is designed to help you understand the basics of how encryption works, why it matters, and what challenges are facing encryption in the new landscape of the Internet of Things (IoT).

(more available)
Added: October 14, 2018
  • ««
  • «
  • 44
  • 45
  • 46
  • 47
  • 48
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 29, 2025 16:08 UTC (build b1d7be4)