Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Breach

Below you will find reports with the tag of “Data Breach”

image from Post-Soviet Bank Heists

Post-Soviet Bank Heists

This report takes a look at recent bank heists that originated from Post-Soviet states.

Added: October 19, 2018
image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from The True Cost Of Compliance With Data Protection Regulations

The True Cost Of Compliance With Data Protection Regulations

Ponemon Institute and Globalscape conducted The True Cost of Compliance with Data Protection Regulations to determine the full economic impact of compliance activities for a representative sample of 53 multinational organizations. An earlier study was completed in 2011 and those findings are compared to this year’s results.

(more available)
Added: October 19, 2018
image from Transformational ‘smart cities’: cyber security and resilience

Transformational ‘smart cities’: cyber security and resilience

This report will explore the requirements and challenges of creating a secure, reliable and resilient smart city. It will consider how administrations and the overall city ecosystems will need to provide innovative, resilient ‘smart’ solutions that leverage digital information while protecting against malicious violations, unintentional damage and natural disasters.

(more available)
Added: October 19, 2018
image from 2015 State of Cybersecurity Leadership Report

2015 State of Cybersecurity Leadership Report

This paper was developed to help CISOs, CIOs, executive teams and boards of directors learn what they need to know to work together to address the challenges posed by cyber threats in the context of overall risk to the business.

(more available)
Added: October 18, 2018
image from 2018 Security Pressures Report

2018 Security Pressures Report

Based on a survey of 1,600 information security decision-makers and influencers in six countries, the 2018 Security Pressures Report delves into keeping businesses safeguarded against cyber threats, attacks and compromises.

(more available)
Added: October 18, 2018
image from 3 Steps To Mitigating Insider Threat Without Slowing Down Users

3 Steps To Mitigating Insider Threat Without Slowing Down Users

The point of this white paper is to teach folks how to leverage endpoint security to spot risk and free their users.

(more available)
Added: October 18, 2018
image from Are Your Employees A Cybersecurity Risk?

Are Your Employees A Cybersecurity Risk?

Today’s threat landscape is rapidly evolving, which means it is simply not enough for organizations to roll out an annual security training program and then pat themselves on the back for a job well done. Companies need to consistently invest in training and keep their employees updated on the latest vulnerabilities.

(more available)
Added: October 18, 2018
image from Behind our Digital Doors: Cybersecurity & the Connected Home

Behind our Digital Doors: Cybersecurity & the Connected Home

In support of National Cyber Security Awareness Month (October), ESET® and the National Cyber Security Alliance (NCSA) commissioned a survey to better understand the role of cybersecurity in the American household, providing an inside-look into how it is adapting in the digital era of the data breach. Given the simultaneous rise in our number of connected devices and cyber threats, this survey underlined the importance of cybersecurity as a core commitment in our digital lives. This paper discusses the findings of that survey.

(more available)
Added: October 18, 2018
image from Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

The aim of this paper is to establish a database on studies, articles and working papers on cyber risk and cyber risk insurance.Based on this, we provide insurance practitioners and academics a high-level overview of the main research topics and future research directions in the field.

(more available)
Added: October 18, 2018
image from Build Vs. Buy: Evaluating Identity Management

Build Vs. Buy: Evaluating Identity Management

Every corporation struggles with the decision to Build or Buy an identity management platform. This report seeks to offer advice to aid in that decision.

(more available)
Added: October 18, 2018
image from Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

In this study they characterize the extent to which cyber security incidents, such as those referenced by Verizon in its annual Data Breach Investigations Reports (DBIR), can be predicted based on externally observable prop- erties of an organization’s network.

(more available)
Added: October 18, 2018
image from Cyber Incident And Breach Trends Report

Cyber Incident And Breach Trends Report

This report takes a look at the major incidents that took place in 2017.

Added: October 18, 2018
image from CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

What do business leaders make of security? How do they perceive its practice and importance? Where are the gaps between business and security leaders? Part two of the CyberArk Global Advanced Threat Landscape Report 2018 explores these issues via responses from individuals including IT security decision-makers and line of business owners, from organizations ranging in size from 500 employees to 5,000 or more workers.

(more available)
Added: October 18, 2018
image from Data Breach QuickView - Mid-Year 2015 Data Breach Trends

Data Breach QuickView - Mid-Year 2015 Data Breach Trends

This annual report offers a quick view of data breach trends for mid-year 2015.

Added: October 18, 2018
image from GDPR Compliancy: A Global Change Is On Its Way

GDPR Compliancy: A Global Change Is On Its Way

In this short article, they provide a quick ability to understand the GDPR and how it will impact the world.

(more available)
Added: October 18, 2018
image from Getting To Yes With China In Cyberspace

Getting To Yes With China In Cyberspace

This report is a response to the absence of a formal dialogue and explores U.S. policy options for managing relations with China over this critical policy area. It looks at two basic questions: Can the United States and China return to meaningful formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement, and what might be exchanged for what?

(more available)
Added: October 18, 2018
image from Global Insurance and Regluatory Bulletin

Global Insurance and Regluatory Bulletin

This paper discusses the global regulations placed on the insurance industry. Of note, it does discuss cyber insurance in the United States.

(more available)
Added: October 18, 2018
image from How To Mitigate Five IT Problems Affecting The Financial Industry

How To Mitigate Five IT Problems Affecting The Financial Industry

Read this whitepaper to see how you can mitigate the following five financial services industry IT challenges. Minimize breaches, reduce cyber theft, use technology to improve network performance, improve compliance, and leverage technology to provide a competitive advantage.

(more available)
Added: October 18, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

Here are some quick facts about this report and what they tell us about the issues that the healthcare industry as a whole needs to address: 58% of incidents involved insiders—healthcare is the only industry in which internal actors are the biggest threat to an organization. Medical device hacking may create media hype but the assets most often affected in breaches are databases and paper documents. Ransomware is the top malware variety by a wide margin. 70% of incidents involving malicious code were ransomware infections. Basic security measures are still not being implemented. Lost and stolen laptops with unencrypted PHI continue to be the cause of breach notifications.

(more available)
Added: October 18, 2018
image from The Hacker-Powered Security Report 2017

The Hacker-Powered Security Report 2017

This report examines the broadest platform data set available and explains why organizations like General Motors, Starbucks, Uber, the U.S. Department of Defense, Lufthansa, and Nintendo have embraced continuous, hacker-powered security.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 28
  • 29
  • 30
  • 31
  • 32
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 04:08 UTC (build b1d7be4)