Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Breach

Below you will find reports with the tag of “Data Breach”

image from Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

Australian Companies Leaving Themselves Exposed On Security And Compliance:Survey

This paper presents the results of a survey conducted in Australia to understand how prepared companies were for cyber breach situations, and compliance.

(more available)
Added: October 12, 2018
image from Best Practices For Protecting Your Data When Employees Leave Your Company

Best Practices For Protecting Your Data When Employees Leave Your Company

When employees leave a company, whether voluntarily or involuntarily, it is quite common for them to take sensitive and confidential data with them. This paper examines this problem in detail and provides solutions for employers to mitigate the risks.

(more available)
Added: October 12, 2018
image from Cyber Extortion Risk Report

Cyber Extortion Risk Report

This report looks at the costs, and the growth, of cybercrimes, based on data from five countries. It also examines the types and numbers of cyber crimes and their impacts. It also offers predictions for the future of cyber crimes.

(more available)
Added: October 12, 2018
image from Cybersecurity In Healthcare: The Diagnosis

Cybersecurity In Healthcare: The Diagnosis

This report was commissioned to understand whether or not the healthcare industry was prepared for the growing and evolving cybersecurity threats.

(more available)
Added: October 12, 2018
image from EMV Issuance Trajectory And Impact On Account Takeover And CNP

EMV Issuance Trajectory And Impact On Account Takeover And CNP

This report is sponsored by iovation, which wanted to investigate the state of the U.S. EMV migration and the associated account takeover, CNP fraud, and application fraud trends. The research will help FI executives benchmark their EMV progress against their peers’ and better understand the rapidly shifting fraud landscape.

(more available)
Added: October 12, 2018
image from Enterprises Re-engineer Security in the Age of Digital Transformation

Enterprises Re-engineer Security in the Age of Digital Transformation

In this report, they highlight key findings from a recent survey of more than 200 CIO’s and CISO’s, and outline how executives are actively revising security models to create a culture of cybersecurity and safeguard their organizations in today’s continually changing business environment.

(more available)
Added: October 12, 2018
image from GDPR Cheat Sheet For Cybersecurity Professionals

GDPR Cheat Sheet For Cybersecurity Professionals

This paper provides a simple approach to understanding and implementing GDPR compliance.

Added: October 12, 2018
image from GDPR Headlines

GDPR Headlines

Centrify has worked with the specialist law firm, Cordery, to develop this headline summary of when the GDPR applies, the key impacts and what you need to do to comply with the GDPR.

(more available)
Added: October 12, 2018
image from GDPR White Paper

GDPR White Paper

This paper takes a good and definitive look at the GDPR.

Added: October 12, 2018
image from Healthcare: A Growing Cyber Sickness-Infogrpahic

Healthcare: A Growing Cyber Sickness-Infogrpahic

A short but informative infographic detailing the impact of cyber attacks on the Healthcare market.

Added: October 12, 2018
image from Managing Cybersecurity: The Cyber Risk Protection Story 2018

Managing Cybersecurity: The Cyber Risk Protection Story 2018

Marsh & McLennan Agency surveyed 1,141 executives from small to middle-market organizations across North America, and found that they are clearly concerned about cyber risk — but, by their own admission, they do not have a grasp of how to protect themselves.

(more available)
Added: October 12, 2018
image from NANHAISHU:RATing The South China Sea

NANHAISHU:RATing The South China Sea

This whitepaper details a malicious program identified as NanHaiShu. Based on analysis, the threat actor behind this malware targets government and private-sector organizations. Notable targets of the malware include the Department of Justice of the Philippines, the organizers of the Asia-Pacific Economic Cooperation (APEC) Summit and a major international law firm.

(more available)
Added: October 12, 2018
image from Tackling Data Privacy To Unlock The Power Of Big Data Analytics

Tackling Data Privacy To Unlock The Power Of Big Data Analytics

From the report, “Overall, the power of big data analytics is clear, but some fundamental building blocks need to be in place if banks are to unlock that power for commercial benefit.”

(more available)
Added: October 12, 2018
image from Ten Key Questions on Cyber Risk and Cyber Risk Insurance

Ten Key Questions on Cyber Risk and Cyber Risk Insurance

By providing an overview of the main areas of research and the key studies conducted in the field to date, and by making some initial recommendations about the potential role of insurers and governments in addressing cyber risks, this report lays the groundwork for discussion and future research on the development of the cyber risk and the cyber insurance market.

(more available)
Added: October 12, 2018
image from The GDPR: An Action Guide

The GDPR: An Action Guide

This is a recently updated eBook that lays out an action guide for compliance with the EU’s GDPR.

Added: October 12, 2018
image from Using Deception to Hunt Cyber Attackers

Using Deception to Hunt Cyber Attackers

From the report, “Today, there are a great many detection (identification and tracking) tools. However, there is not enough emphasis on trapping, resulting in a lack of effective trapping tools and techniques. An effective technique for automating the tracking of cyber attackers and, once found, trapping them, is deception. When implemented well, deception can automate and scale the hunting process, accurately identifying and tracking attackers, and trapping them to protect valuable assets while reducing valuable human resources in this never-ending competition of wits.”

(more available)
Added: October 12, 2018
image from What CISO's Worry About In 2018

What CISO's Worry About In 2018

The purpose of the survey was to understand key concerns and opinions of Chief Information Security Officers and CIOs, focused on information security and cyber-risk, as we head into 2018.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 33
  • 34
  • 35
  • 36
  • 37
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 16:09 UTC (build b1d7be4)