Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Breach

Below you will find reports with the tag of “Data Breach”

image from 2018 Cloud Security Report

2018 Cloud Security Report

Offering insight into a variety of issues related to cloud security, this report discusses several key issues, including, the biggest threats to cloud security, legacy security tools that do not work in the cloud, and the growth of cloud security budgets.

(more available)
Added: October 23, 2018
image from 2018 Security Report

2018 Security Report

This report takes a look at 5 key trends that are shaping IT security practices, with findings that provide insight into customer challenges, threat actor behavior, and the global threat landscape.

(more available)
Added: October 23, 2018
image from Achieving Cyber Resilience

Achieving Cyber Resilience

This paper lays out the appropriate steps companies should take to protect their business from cyber attacks and ransomware.

Added: October 23, 2018
image from Annual Ransomware Report 2017

Annual Ransomware Report 2017

Druva conducted its annual ransomware survey to better understand what impact ransomware has had on organizations, how they have responded to breaches, and what their outlook is regarding the future of these types of malware attacks.

(more available)
Added: October 23, 2018
image from Beyond the Bottom Line: The Real Cost of Data Breaches

Beyond the Bottom Line: The Real Cost of Data Breaches

This report is based on the results of an independent survey conducted by market research specialist Vanson Bourne.

Added: October 23, 2018
image from Breaking Down The Complexity Of Retail Security

Breaking Down The Complexity Of Retail Security

This report takes a look at retail security. It discusses the challenges, and options available to help solve some of the problems involved in defending retail markets.

(more available)
Added: October 23, 2018
image from Cloud Hard 2018 Security With A Vengeance

Cloud Hard 2018 Security With A Vengeance

In partnership with the Information Security Community, Bitglass surveyed over 570 cybersecurity and IT professionals to learn how organizations are approaching cloud security. Read on to learn about the state of traditional tools, security measures IT leaders are taking, and cloud priorities for 2018.

(more available)
Added: October 23, 2018
image from Consumer Account Security Report 2016

Consumer Account Security Report 2016

The report describes consumers’ account security practices, their exposure to security incidents and their expectations for companies to protect their mobile and online accounts. Data are drawn from an online survey of 1,300 adults conducted in September 2016.

(more available)
Added: October 23, 2018
image from Examining The Costs and Causes of Cyber Incidents

Examining The Costs and Causes of Cyber Incidents

Researchers built a number of scanning devices using Raspberry Pi minicomputers and, by taking them out to athletic events and busy public spaces, found that tracking of individuals was possible.

(more available)
Added: October 23, 2018
image from Global Cloud Data Security Report Q1 2015

Global Cloud Data Security Report Q1 2015

From the report, “CipherCloud enables organizations to embrace cloud applications by protecting critical data going into the cloud. This approach has been adopted by millions of users in multiple industries, such as healthcare, banking and finance, telecommunications and government, across the globe. This report gathers insight from CipherCloud’s installed base and provides analysis on how enterprises approach cloud security and data protection.”

(more available)
Added: October 23, 2018
image from Ironclad API's:An Approach For Application Security Testing

Ironclad API's:An Approach For Application Security Testing

This paper discusses some API’s and how you can protect them from an attack.

Added: October 23, 2018
image from Is Data The New Endpoint

Is Data The New Endpoint

This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured.

(more available)
Added: October 23, 2018
image from Key Findings from The Global State of Information Security Survey 2017

Key Findings from The Global State of Information Security Survey 2017

This initial paper explores how digital organizations are leveraging new technology safeguards to build a cybersecurity and privacy program that jumpstarts success—and creates a truly differentiating business capability.

(more available)
Added: October 23, 2018
image from PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

While a data loss incident can be a disaster for an organization’s reputation, there is now a new imperative around inbound information as well. Unwanted data acquisition can create problems just as much as data leaving the organization. There are a couple of scenarios which should be considered. Read this paper to know more.

(more available)
Added: October 23, 2018
image from Ten Key Questions on Cyber Risk and Cyber Risk Insurance

Ten Key Questions on Cyber Risk and Cyber Risk Insurance

This study claims to be the first systematic discussion of potential risk transfer options for cyber risks. They compare several risk transfer options, including insurance, reinsurance and alternative risk transfer. Moreover, they discuss the potential role of the government and the capacity of insurance pools to improve insurability.

(more available)
Added: October 23, 2018
image from The IR Boost: How Threat Hunting Enhances Incident Response

The IR Boost: How Threat Hunting Enhances Incident Response

Whether it’s referred to as threat hunting or hunt teaming, companies are increasingly taking a proactive approach to security by looking for evidence of threats that are already in their environments. Organizations have realized that waiting for antivirus, SIEMs and other security solutions to trigger an alert is not a practical approach to detecting sophisticated and stealthy adversaries since they know how to evade these tools. Hunting enables security teams to proactively answer the question “Am I under attack?”

(more available)
Added: October 23, 2018
image from United Endpoint Management: The Next Step In The Evolution Of Device Management

United Endpoint Management: The Next Step In The Evolution Of Device Management

This paper provides a simple summary of Endpoint Management and why it is necessary and helpful.

Added: October 23, 2018
image from Winning The War On Ransomware

Winning The War On Ransomware

This is an infographic that can help your organization understand and win the war on Ransomware.

Added: October 23, 2018
image from 17 Things Every CFO Should Know About The Human Side Of Cybersecurity

17 Things Every CFO Should Know About The Human Side Of Cybersecurity

This resource is designed to help you see the importance of people-focused solutions to cybersecurity risk mitigation. Here they’ve collected 17 statistics to help make the point that, “a cybersecurity budget isn’t complete until you’ve allocated money to building your human capacity to identify and respond to cybersecurity risk.”

(more available)
Added: October 22, 2018
image from 2015 Cost of Data Breach Study: United States

2015 Cost of Data Breach Study: United States

This year’s study examines the costs incurred by 62 U.S. companies in 16 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims as required by various laws. It is important to note the costs presented in this research are not hypothetical, but are from actual data loss incidents. They are based upon cost estimates provided by individuals, interviewed over a ten-month period in the companies that are represented in this research

(more available)
Added: October 22, 2018
image from 2015 Data Breach Investigations Report

2015 Data Breach Investigations Report

Verizon’s annual report on all data breaches in 2015

Added: October 22, 2018
  • ««
  • «
  • 23
  • 24
  • 25
  • 26
  • 27
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)