Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Breach

Below you will find reports with the tag of “Data Breach”

image from 2017 Cloud Security Report

2017 Cloud Security Report

This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others.

(more available)
Added: October 21, 2018
image from 6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

This white paper presents the key best practices for law firms of all sizes that want to to enable cloud-based file sharing while protecting sensitive data.

(more available)
Added: October 21, 2018
image from Cloud Security Report 2017: Security At Speed And Scale

Cloud Security Report 2017: Security At Speed And Scale

In Threat Stack Cloud Security Report 2017: Security at Speed & Scale, they set out to determine how Operations, Security, and DevOps professionals are dealing with increasingly complex environments, using limited resources, as they seek to satisfy internal and external security demands along with compliance requirements. They also wanted to see how the rise of containerization is impacting this already complex dynamic. To accomplish this, they teamed with ESG Global to survey the organizations and individuals responsible for securing cloud-based applications within their organizations.

(more available)
Added: October 21, 2018
image from Cyber Balance Sheet 2017 Report

Cyber Balance Sheet 2017 Report

This study prepared by the Cyentia Institute breaks down walls between cybersecurity leaders and Boards of Direc- tors. Data is often said to be the lifeblood of the company; yet, there is immense frustration at how risks to that information are measured, mitigated, and communicated across the enterprise. As the financial, regulatory, and legal stakes of data breaches and disruptions rise, leaders at all levels must come together to protect and further the business.

(more available)
Added: October 21, 2018
image from Cybersecurity: Labor Market Analysis And Statewide Survey Results

Cybersecurity: Labor Market Analysis And Statewide Survey Results

This report takes a look at the labor market in California, specifically as it relates to Cybersecurity. It offers insight into the growing need for more cybersecurity employees, as well as educational changes that can be made to fill the void.

(more available)
Added: October 21, 2018
image from Dealing With The New EU GDPR

Dealing With The New EU GDPR

This paper takes a look at the GDPR and asks if your organization is ready for it.

Added: October 21, 2018
image from Email Encryption Secure File Transfer Best Practice

Email Encryption Secure File Transfer Best Practice

This report provides a discussion about the best practices for Email encryption.

Added: October 21, 2018
image from Email Impersonation Attacks: A Clear And Present Danger

Email Impersonation Attacks: A Clear And Present Danger

Sponsored by Valimail, Email Impersonation Attacks: A Clear & Present Danger, was conducted by Ponemon Institute to understand the challenges organizations face to protect end-users from email threats, such as impersonation attacks.

(more available)
Added: October 21, 2018
image from Fine Determination

Fine Determination

This paper provides insight into specific fines that will occurr due to the GDPR.

Added: October 21, 2018
image from Guidelines For Increasing Public Sector Cybersecurity

Guidelines For Increasing Public Sector Cybersecurity

This paper discusses the issues that revolve around cybersecurity in the public sector.

Added: October 21, 2018
image from Health Warning: Cyberattacks Are Targeting The Healthcare Industry

Health Warning: Cyberattacks Are Targeting The Healthcare Industry

This research report is about theft in the healthcare industry. Specifically, it describes the marketplace for stolen healthcare industry data and examines the motivations for its theft.

(more available)
Added: October 21, 2018
image from How Boards of Directors Really Feel About Cyber Security Reports

How Boards of Directors Really Feel About Cyber Security Reports

This paper sets out to reveal if IT data reported to boards of directors, enables them to make good decisions.

(more available)
Added: October 21, 2018
image from How Cyber Threat Intelligence Safegaurds Against Today's Threat Landscape

How Cyber Threat Intelligence Safegaurds Against Today's Threat Landscape

This paper takes a look at Cyber Threat Intelligence.

Added: October 21, 2018
image from How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

This paper presents exclusive research into how chat platforms can be abused and become a cyber security weakness.

Added: October 21, 2018
image from Identity Theft In America

Identity Theft In America

This report provides an overlook at Identity Theft in America and how it can be prevented.

Added: October 21, 2018
image from Incident Response Survey 2017

Incident Response Survey 2017

From the report, “In the following pages, we examine the results of the survey in detail and offer guidelines and feedback on how our industry can continue to improve. The show must go on—but it is far from over.”

(more available)
Added: October 21, 2018
image from Innovation Insight For Unstructured Data Classification

Innovation Insight For Unstructured Data Classification

From the report, “The perpetually expanding volume and propagation of the unstructured data being stored and used by organizations is making information increasingly difficult to secure. Security and risk management leaders who implement data classification technologies will greatly enhance their chances of success.”

(more available)
Added: October 21, 2018
image from Microsoft As A Trusted Advisor And Partner On Cyber Resilience

Microsoft As A Trusted Advisor And Partner On Cyber Resilience

This whitepaper provides information about developing your organization’s cyber resiliance.

Added: October 21, 2018
image from New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business

New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business

This report provides insight into Australian Data Breach Protocol.

Added: October 21, 2018
image from New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

New Detection Survey Unveils Top 5 Cybersecurity Threats Facing Companies Over The Next 2 Years

In August 2017, Cyber adAPT partnered with research and smart data firm Aberdeen Group to conduct a threat detection survey. The results provide critical data and the ability to analyze a variety of detection technology questions and scenarios.

(more available)
Added: October 21, 2018
image from Prevent Healthcare Data Breaches With Indentity Management

Prevent Healthcare Data Breaches With Indentity Management

Learn how Single Sign-On and identity management can be used for the healthcare industry. In 2016 alone, over 15 million medical records were stolen due to data breaches. The risks associated with security and identity management are higher in healthcare than any other industry.

(more available)
Added: October 21, 2018
  • ««
  • «
  • 25
  • 26
  • 27
  • 28
  • 29
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 08:08 UTC (build b1d7be4)