Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Breach

Below you will find reports with the tag of “Data Breach”

image from Threat Landscape 2015

Threat Landscape 2015

For yet another year the 2015 edition of the cyber-threat landscape features a number of unique observations, the main one being the smooth advancement of maturity. As a matter of fact, cyber-space stakeholders have gone through varying degrees of further maturity. While the friendly agents – the good guys – have demonstrated increased cooperation and orchestrated reaction to cyber-threats, hostile agents – the bad guys – have advanced their malicious tools with obfuscation, stealthiness and striking power.

(more available)
Added: October 18, 2018
image from Top 5 Data Security Threats

Top 5 Data Security Threats

This Report takes a look at the top 5 data security threats and analyzes what a company can do about them.

(more available)
Added: October 18, 2018
image from Vendor Selection & GDPR Compliance

Vendor Selection & GDPR Compliance

This report offers a unique approach to understanding GDPR compliance. The report is a presentation of an interview with two individual CEO’s from two seperate companies.

(more available)
Added: October 18, 2018
image from Who Moved My Secure Perimeter

Who Moved My Secure Perimeter

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.

(more available)
Added: October 18, 2018
image from 2015 Dell Security Annual Threat Report

2015 Dell Security Annual Threat Report

An annual report on cybersecurity threats in 2015.

Added: October 17, 2018
image from 2016 Cyber Insurance Market Trends

2016 Cyber Insurance Market Trends

A paper written about the evolution of the market for cyber insurance.

Added: October 17, 2018
image from 2017 Government Internet Security Threat Report, Volume 22

2017 Government Internet Security Threat Report, Volume 22

This is the Government focussed version of the annual 2017 Security Threat Report from Symantec.

Added: October 17, 2018
image from 2017 Threat Monitoring Report

2017 Threat Monitoring Report

This report is based on a survey of a wide number of cybersecurity professionals, and deals with a variety of issues ranging from the threat landscape to incident recovery.

(more available)
Added: October 17, 2018
image from Cybersecurity For Risk Mitigation In Financial Services

Cybersecurity For Risk Mitigation In Financial Services

From the paper, “The financial industry is no stranger to hacks and data breaches, but recently, the sector has been targeted more aggressively, leaving consumers wondering if their accounts and data are safe. As hackers and attacks become more sophisticated, it is crucial the financial services industry take appropriate actions to safeguard their systems, as well as their customers.”

(more available)
Added: October 17, 2018
image from Data Breach Digest: Perspective Is Reality

Data Breach Digest: Perspective Is Reality

This report offers a helpful understanding of data breaches.

Added: October 17, 2018
image from Data Breach Industry Forecast

Data Breach Industry Forecast

This paper outlines five predictions for the data breach industry in the coming year.

Added: October 17, 2018
image from Data Protection By Design

Data Protection By Design

This paper provides a brief summary of the necessary preparations for becoming GDPR Compliant

Added: October 17, 2018
image from GDPR: A Europe Based Regulation With A Global Impact

GDPR: A Europe Based Regulation With A Global Impact

This report takes a look at the GDPR, and what it means for the world.

Added: October 17, 2018
image from Global IT Risks Survey 2015

Global IT Risks Survey 2015

From the report, “It’s time for businesses to recalibrate the way they think about their security budgets. Seen as a separate expense to IT infrastructure, it appears hard to justify until disaster strikes. But understood as an essential part of the IT environment – including mobile devices and virtualized machines – its value is obvious, especially in the context of the damage and huge costs it can prevent.”

(more available)
Added: October 17, 2018
image from GTIC Monthly Threat Report January 2018

GTIC Monthly Threat Report January 2018

This monthly threat report takes a look at the month of January 2018. Specifically, it looks at two VULNS, the hacking of nuclear weapons, and the increase in suspected Chinese Cyber activity.

(more available)
Added: October 17, 2018
image from Payment Security Report 2015

Payment Security Report 2015

This report concerns itself with the standards and practices related to credit and debit card payment options.

Added: October 17, 2018
image from Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

This guide provides an overview of connected or IoT medical devices, their benefits and risks, real life use cases and best practice security guidelines.

(more available)
Added: October 17, 2018
image from Security Report:The Evolving Role of CISOs

Security Report:The Evolving Role of CISOs

This report presents the consolodiated global findings to better understand the nature of the CISO role and reveal insights, challenges, and approaches to security strategy in today’s global threat landscape.

(more available)
Added: October 17, 2018
image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
image from The Road To Compliance:Steps For Securing Data To Comply With The GDPR

The Road To Compliance:Steps For Securing Data To Comply With The GDPR

Here is another helpful eBook to provide insight into the GDPR compliance situation.

Added: October 17, 2018
image from The Role of Insurance in Managing and Mitigating the Risk

The Role of Insurance in Managing and Mitigating the Risk

Cyber attacks against UK companies present a daily threat to normal UK business operations and are increasing in severity. This report focuses on how insurance can help make UK companies more resilient to the cyber threat, and is the result of four months of co-operation between representatives of the UK Government and the insurance industry, led by the Cabinet Office and Marsh.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 29
  • 30
  • 31
  • 32
  • 33
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 00:08 UTC (build b1d7be4)