Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from BREACH REPORT 2015: Protected Health Information

BREACH REPORT 2015: Protected Health Information

This is Redspin’s 6th annual Breach Report: Protected Health Information (PHI). At the conclusion of each year, they analyze the complete statistical data set of large breaches that have been reported to HHS. In the report, they assess the overall effectiveness of the current policies and controls designed to safeguard PHI. In 2105, they identify significant trends and draw attention to the specific areas most in need of improvement. They then offer Redspin’s recommendations for preventive measures and corrective actions to address any critical gaps or weaknesses. Their goal is to help the healthcare industry continually improve its ability to protect patient information.

(more available)
Added: October 14, 2018
image from CakePHP Security Assessment

CakePHP Security Assessment

This report is based on a study done in 2017 to analyze security issues in CakePHP.

Added: October 14, 2018
image from Cloud Security Report 2017

Cloud Security Report 2017

This report includes research on the evolving state of cloud security.

Added: October 14, 2018
image from Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

This whitepaper discusses the disconnects that have emerged between cybersecurity threats and organizations’ contermeasures.

Added: October 14, 2018
image from Data Thieves: The Motivations Of Cyber Threat Actors And Their Use And Monetization Of Stolen Data

Data Thieves: The Motivations Of Cyber Threat Actors And Their Use And Monetization Of Stolen Data

This paper presents the Testimony of Lillian Ablon before the Committee on Financial Services Subcommittee on Terrorism and Illicit Finance United States House of Representatives on March 15, 2018

(more available)
Added: October 14, 2018
image from Global Fraud Report

Global Fraud Report

This report was based on 10 in-depth interviews and an additional online survey with 545 senior executives worldwide across multiple industries and geographies. The survey was fielded through July and August 2016. The scope of the research covers perceptions of and experiences with cyber and security risk.

(more available)
Added: October 14, 2018
image from GTIC Monthly Threat Report April 2018

GTIC Monthly Threat Report April 2018

This monthly threat report takes a look at the month of April 2018. Specifically it looks at Ransomware and Cryptojacking battling for top threat spot, Russia Nation-State targeting network infrastructure, and supply chain attacks.

(more available)
Added: October 14, 2018
image from Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

This Health Care Cyber Research Report for 2017 shares very recent research on cyberattacker activity in 2017 and the virtual explosion in the reported use of ransomware in attacking health care institutions. 2017 has been a very challenging year for health care institutions. They remain under sustained attack by cyberattackers that continue to target their networks through the use of well understood vulnerabilities.

(more available)
Added: October 14, 2018
image from Implications Of Using Privileged Access Management To Enable Next Generation Technology

Implications Of Using Privileged Access Management To Enable Next Generation Technology

To better understand how security issues, such as privileged access management (PAM), affect the adoption of next-generation technologies, BeyondTrust – the leader in PAM – commissioned the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology survey. The results are a wake-up call for anyone looking to leverage these next-generation technologies.

(more available)
Added: October 14, 2018
image from Information Security and Cyber Liability Risk Management Report 2015

Information Security and Cyber Liability Risk Management Report 2015

This report is based on the findings of a collaborative survey that was designed to gain insight into the current state and ongoing trends in information security and cyber liability risk management. The survey was completed at least in part by 448 respondants which included risk managers, insurance buyers, and other risk professionals.

(more available)
Added: October 14, 2018
image from Is Security Accelerating Your Business

Is Security Accelerating Your Business

This blog post discusse the issues surrounding business data security, and provides some steps that can be taken to improve the situation.

(more available)
Added: October 14, 2018
image from M-Trends 2017

M-Trends 2017

From the report, “For our M-Trends® 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging trends. For the second consecutive year, we have included insights from our FireEye as a Service (FaaS) teams. FaaS monitors organizations 24/7, which gives them a unique perspective into the current threat landscape. Additionally, this year we partnered with law firm DLA Piper for a discussion of the upcoming changes in EMEA data protection laws.”

(more available)
Added: October 14, 2018
image from Report Q1 2015 (January - March 2015)

Report Q1 2015 (January - March 2015)

A breakdown of the data, and types of, cyber attacks that occurred in the first quarter of 2015.

Added: October 14, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report June 2016

SecureWorks Threat Intelligence Executive Monthly Report June 2016

This report from June 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 14, 2018
image from Stateless Attribution: Toward International Accountability In Cyberspace

Stateless Attribution: Toward International Accountability In Cyberspace

In this report, they review the state of cyber attribution and they consider alternative mechanisms for producing standardized and transparent attribution that may overcome concerns about credibility. In particular, this exploratory work considers the value of an indepen- dent, global organization whose mission consists of investigating and publicly attributing major cyber attacks.

(more available)
Added: October 14, 2018
image from Supply Chain Compliance

Supply Chain Compliance

This paper discusses the important new rules in the DFARS cyber clause. It seeks to help organizations by revealing key steps to becoming compliant.

(more available)
Added: October 14, 2018
image from The 2016 Call Center Fraud Report

The 2016 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 14, 2018
image from The Cloud Email Security Challenge

The Cloud Email Security Challenge

This paper takes a look at how automating email security can create better security for an organization.

Added: October 14, 2018
image from The Future of Cybercrime and Security

The Future of Cybercrime and Security

From the report, “This research will present some general trends in cybercrime, as well as indicating the potential global cost of malicious software use. It will discuss specific threats to financial and device-based businesses, as well as providing analyses of the current and future trends in cybercriminal activity, alongside general advice on how to prevent and/or minimise the impact of cybercrime.”

(more available)
Added: October 14, 2018
image from The Procrastinator's Guide To NIST-800-171

The Procrastinator's Guide To NIST-800-171

This report offers helpful insight into preparing for compliance with NIST-800-171.

Added: October 14, 2018
image from Threat Intelligence Executive Report 2017: Volume 5

Threat Intelligence Executive Report 2017: Volume 5

This Threat Report takes a look at some of the events of mid 2017. Specifically, it looks at the use of social platforms to target victims, espionage that targets law firms, weakness in business processes, and phishing.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 45
  • 46
  • 47
  • 48
  • 49
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 29, 2025 16:08 UTC (build b1d7be4)