Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Breach

Below you will find reports with the tag of “Data Breach”

image from Mobile Security Index 2018 Infographic

Mobile Security Index 2018 Infographic

This infographic is based on the report of the same name.

Added: October 16, 2018
image from Risk Degrees Of Separation

Risk Degrees Of Separation

This BitSight Insights report, Risk Degrees of Separation: The Impact of Fourth Party Networks on Organizations, focuses on aggregate risk and the issue of single points of failure. Insurance companies tackle this risk by monitoring whether a common set of threats impact their entire portfolio of insureds. However, without visibility into cyber risk aggregation, an insurance company could be jeopardized if there is a breach or any type of network disruption that affects a majority of their insureds.

(more available)
Added: October 16, 2018
image from Threat Report 2015

Threat Report 2015

The Proofpoint Threat Report explores threats, trends, and transformations that they see within their customer base and in the wider security marketplace.

(more available)
Added: October 16, 2018
image from Top Threats To Cloud Computing: Deep Dive

Top Threats To Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the top threat’s for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. They encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

(more available)
Added: October 16, 2018
image from UK 2015 Cyber Risk Survey Report

UK 2015 Cyber Risk Survey Report

This is an in-depth study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. The benchmarking data in this report was collected from risk professionals and CFOs from large and medium-sized corporations from across the UK. It is the hope that the aggregated information will provide useful benchmarking data and reference points against which the reader can compare their own company’s positions.

(more available)
Added: October 16, 2018
image from Written Testimony US House Committee On Energy And Commerce

Written Testimony US House Committee On Energy And Commerce

This is the transcript of testimony given before the US House Committee On Energy And Commerce.

Added: October 16, 2018
image from X-Force Threat Intelligence Report - 2016

X-Force Threat Intelligence Report - 2016

This report discusses information gleaned from the notable highlights in cyber threats during the year 2015. It studies notable incidents and targeted malware affecting geographies including Canada, Australia, the United Kingdom, France, Turkey and Japan. It also discusses the barriers that must be overcome in order to prevent cyber attacks from occurring.

(more available)
Added: October 16, 2018
image from 2015 Data Breach Industry Forecast

2015 Data Breach Industry Forecast

To help businesses understand implications of such changes and navigate the road ahead, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape. With this mindset, they also looked back at how our 2014 predictions played out.

(more available)
Added: October 15, 2018
image from 2015 Information security breaches survey

2015 Information security breaches survey

A report from the government of the United Kingdom detailing the findings of a survey regarding security breaches in 2015.

(more available)
Added: October 15, 2018
image from 2015 Strategic Security Survey

2015 Strategic Security Survey

In this report, they: a) Discuss the assumptions shaping IT defense spending plans b) Delve into the real and intangible costs of a data breach c) Examine why malware is still the most common form of breach. d) Look at which threats on which security teams need to focus.

(more available)
Added: October 15, 2018
image from 2017 Call Center Fraud Report

2017 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 15, 2018
image from 2017 Phishing Response Trends South Africa Region

2017 Phishing Response Trends South Africa Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 15, 2018
image from 2018 GDPR Compliance Report

2018 GDPR Compliance Report

This research uncovers the perspectives of organizations on the impact of the new regulation, how prepared they are, and how they plan to be in compliance with the new law to avoid significant penalties.

(more available)
Added: October 15, 2018
image from Achieving A Competitive Advantage Through Application Security

Achieving A Competitive Advantage Through Application Security

This paper provides 5 key takeaways from a survey of IT professionals and executives who make software purchasing decisions for their organization.

(more available)
Added: October 15, 2018
image from Be Compromise Ready 2017 Data Security Incident Response Report

Be Compromise Ready 2017 Data Security Incident Response Report

From the Report, “Cybersecurity carries a certain mystique. This comes from a combination of people not being “tech savvy,” sensationalized or incorrect headlines (“Guests Locked in Their Hotel Rooms by Ransomware”), superficial advice from so-called experts and technology-driven cure-alls. The reality is that if you focus on the basics, you will be better positioned to be “Compromise Ready.” Like other material risks companies face, cybersecurity readiness requires an enterprise wide approach tailored to the culture and industry of the company. There is no one-size-fits-all solution.”

(more available)
Added: October 15, 2018
image from Cloud Best Practices:Audit Checklist For Endpoint Security

Cloud Best Practices:Audit Checklist For Endpoint Security

This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.

(more available)
Added: October 15, 2018
image from Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance

What is the balance of economic benefits and costs conferred upon societies by cyber technologies, also designated here as information and communication technologies (ICT)? And how might that balance change in coming years? This report, prepared as a quantitative foundation for work sponsored by the Zurich Insurance Group, addresses these questions by assessing the current pattern of benefits and costs in countries and globally, mapping their apparent trajectory in recent years, and exploring their possible futures through 2030.

(more available)
Added: October 15, 2018
image from Cyber Security Considerations For Financial Institutions

Cyber Security Considerations For Financial Institutions

This paper discusses the issues that are caused by, “technology innovation and spearheaded by a generation that expects a seamless customer experience, the financial services landscape is undergoing fundamental change, which will no doubt influence the industry’s future cyber security considerations.”

(more available)
Added: October 15, 2018
image from Data Protection Under POPI

Data Protection Under POPI

This white paper provides insight into becoming complaint with South Africa’s Protection of Personal Information Bill. (POPI)

Added: October 15, 2018
image from GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 15, 2018
image from Gemalto Expands Service Based Security Platform With SafeNet Data Protection On Demand

Gemalto Expands Service Based Security Platform With SafeNet Data Protection On Demand

This report offers a good look at Gemalto’s new service based security platform.

Added: October 15, 2018
  • ««
  • «
  • 31
  • 32
  • 33
  • 34
  • 35
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 20:08 UTC (build b1d7be4)