Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from Ransomware: A Nightmare for Business

Ransomware: A Nightmare for Business

An Infographic created to explain what Ransomware is.

Added: October 13, 2018
image from The Cost of Cyber Crime

The Cost of Cyber Crime

This research develops a causal model, relating different cyber crime types to their impact on the UK economy. The model provides a simple framework to assess each type of cyber crime for its various impacts on citizens, businesses and the Government.

(more available)
Added: October 13, 2018
image from The EU General Data Protection Regulation

The EU General Data Protection Regulation

This whitepaper discusses what the General Data Protection Regulation (GDPR) will mean to organizations globally.

Added: October 13, 2018
image from Threat Advisory: CBS mobile apps & website

Threat Advisory: CBS mobile apps & website

This is a threat advisory for CBS mobile apps & website

Added: October 13, 2018
image from Threat Intelligence Executive Report 2017: Volume 4

Threat Intelligence Executive Report 2017: Volume 4

This Threat Report takes a look at some of the events of mid 2017. Specifically, it looks at the global WannaCry and Petya Threats, attacks that bypass filtering, a Chinese threat group, and threat actors stealing intellectual property from Japan.

(more available)
Added: October 13, 2018
image from Top 7 Office 365 Security Use Cases For a CASB 2016

Top 7 Office 365 Security Use Cases For a CASB 2016

This eBook discusses revelant cloud security information for those using Microsoft Office 365

Added: October 13, 2018
image from Using Security Metrics to Drive Action

Using Security Metrics to Drive Action

An Annual Showcase of Data Breaches.

Added: October 13, 2018
image from Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

As security measures get better at detecting and blocking both malware and cyberattacks, adversaries and cybercriminals are forced to constantly develop new techniques to evade detection. One of these advanced techniques involves “fileless" exploits, where no executable file is written to disk. These attacks are particularly effective at evading traditional antivirus (AV) solutions, which look for files saved to disk so they can scan them and determine if they are malicious. This report discusses these issues.

(more available)
Added: October 13, 2018
image from Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Connected cars are facing four fundamnetal challenges that need to be overcome. See what these automotive Ethernet industry challenges are and the solutions that are available to help overcome several of the challenges.

(more available)
Added: October 13, 2018
image from 2015 Data Breach Reports

2015 Data Breach Reports

This report is an overwhelmingly large list and description of security breaches. It details type of industry impacted, type of attack, and types of information compromised.

(more available)
Added: October 12, 2018
image from 2017 Data Breach Investigations Report

2017 Data Breach Investigations Report

As always, this report is comprised of real-world data breaches and security incidents—either investigated by us or provided by one of our outstanding data contributors.

(more available)
Added: October 12, 2018
image from 2017 Phishing Response Trends Australia Region

2017 Phishing Response Trends Australia Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 12, 2018
image from 2017 Security Predictions

2017 Security Predictions

This report seeks to prove that the world emerging in 2017 will challenge cybersecurity professionals like never before.

Added: October 12, 2018
image from A Priviliged Account Security Approach To GDPR Readiness

A Priviliged Account Security Approach To GDPR Readiness

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 12, 2018
image from A Technical Solutions Guide For Privileged Password And Session Management Use Cases

A Technical Solutions Guide For Privileged Password And Session Management Use Cases

Despite the number of data breach stories in the news, many IT organizations fall into the easy trap of using shared accounts for users, administrators, or applications. While this practice means that, when access is needed, everyone can easily pitch in to get the work done, it comes with massive, unjustifiable security and compliance tradeoffs. This paper seeks to provide assistance with these situations.

(more available)
Added: October 12, 2018
image from Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

This paper presents the results of a survey conducted in Australia to understand how prepared companies were for cyber breach situations, and compliance.

(more available)
Added: October 12, 2018
image from Best Practices For Protecting Your Data When Employees Leave Your Company

Best Practices For Protecting Your Data When Employees Leave Your Company

When employees leave a company, whether voluntarily or involuntarily, it is quite common for them to take sensitive and confidential data with them. This paper examines this problem in detail and provides solutions for employers to mitigate the risks.

(more available)
Added: October 12, 2018
image from Cloud Security Trends: May 2017

Cloud Security Trends: May 2017

This is a report on cloud security trends.

Added: October 12, 2018
image from Cyber Extortion Risk Report

Cyber Extortion Risk Report

This report looks at the costs, and the growth, of cybercrimes, based on data from five countries. It also examines the types and numbers of cyber crimes and their impacts. It also offers predictions for the future of cyber crimes.

(more available)
Added: October 12, 2018
image from Cyber Power Potential Of The Army's Reserve Component

Cyber Power Potential Of The Army's Reserve Component

This report documents research conducted as part of a study entitled “Managing and Developing Reserve Component Capabilities in Sup- port of the Army’s Cyber Force.” The primary purpose of the study was to conduct initial research on how to train, manage, and develop the Army’s cyber force, with a specific focus on the Army National Guard and the U.S. Army Reserve.

(more available)
Added: October 12, 2018
image from Cybersecurity Challenges in Aviation

Cybersecurity Challenges in Aviation

This paper discusses the issues and challenges involved in maintaining good cybersecurity in the field of aviation.

Added: October 12, 2018
  • ««
  • «
  • 46
  • 47
  • 48
  • 49
  • 50
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 29, 2025 16:08 UTC (build b1d7be4)