Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Protection

Below you will find reports with the tag of “Data Protection”

image from The 2018 Global Cloud Data Security Study

The 2018 Global Cloud Data Security Study

This year’s study reveals the increasing risk of noncompliance with new global privacy and data protection regulations. Another important trend over the past three years is IT security’s continuing loss of control over cloud security practices and budget.

(more available)
Added: October 26, 2018
image from Cross Domain Security Rising To The Clouds

Cross Domain Security Rising To The Clouds

This report asks the question, “The US Government is beginning the migration to cloud services with FedRAMP providers and other dedicated resources – what’s the best approach for your agency?”

(more available)
Added: October 25, 2018
image from Marketscape Worldwide Cloud Security Gateways 2017 Vendor Assessment

Marketscape Worldwide Cloud Security Gateways 2017 Vendor Assessment

This report takes a look at Cloud Security Gateways and asks important questions that lead to proper vendor assesment.

Added: October 24, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of how mobile app security can be achieved through the technique of code injection.

(more available)
Added: October 24, 2018
image from Securing Information In The Age Of Collaboration

Securing Information In The Age Of Collaboration

This report presents the results of a survey run by ESG and commissioned by Seclore. They analyze information related to data, data security, and collaboration.

(more available)
Added: October 24, 2018
image from Cloud Hard 2018 Security With A Vengeance

Cloud Hard 2018 Security With A Vengeance

In partnership with the Information Security Community, Bitglass surveyed over 570 cybersecurity and IT professionals to learn how organizations are approaching cloud security. Read on to learn about the state of traditional tools, security measures IT leaders are taking, and cloud priorities for 2018.

(more available)
Added: October 23, 2018
image from Global Cloud Data Security Report Q1 2015

Global Cloud Data Security Report Q1 2015

From the report, “CipherCloud enables organizations to embrace cloud applications by protecting critical data going into the cloud. This approach has been adopted by millions of users in multiple industries, such as healthcare, banking and finance, telecommunications and government, across the globe. This report gathers insight from CipherCloud’s installed base and provides analysis on how enterprises approach cloud security and data protection.”

(more available)
Added: October 23, 2018
image from Is Data The New Endpoint

Is Data The New Endpoint

This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured.

(more available)
Added: October 23, 2018
image from PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

While a data loss incident can be a disaster for an organization’s reputation, there is now a new imperative around inbound information as well. Unwanted data acquisition can create problems just as much as data leaving the organization. There are a couple of scenarios which should be considered. Read this paper to know more.

(more available)
Added: October 23, 2018
image from United Endpoint Management: The Next Step In The Evolution Of Device Management

United Endpoint Management: The Next Step In The Evolution Of Device Management

This paper provides a simple summary of Endpoint Management and why it is necessary and helpful.

Added: October 23, 2018
image from Has The Enforcer Become The Enabler?

Has The Enforcer Become The Enabler?

This paper talks about what the next evolution of Data Loss Prevention technology means for business collaboration and productivity.

Added: October 22, 2018
image from Sensitive Data At Risk:The SANS 2017 Data Protection Survey

Sensitive Data At Risk:The SANS 2017 Data Protection Survey

This report is based on a survey that sought to see how organizations were protecting their data.

Added: October 22, 2018
image from The Five Steps To Managing Third Party Risk

The Five Steps To Managing Third Party Risk

This white paper tackles the subject of how outsourced labor can cause cybersecurity risk.

Added: October 22, 2018
image from 6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

This white paper presents the key best practices for law firms of all sizes that want to to enable cloud-based file sharing while protecting sensitive data.

(more available)
Added: October 21, 2018
image from Dealing With The New EU GDPR

Dealing With The New EU GDPR

This paper takes a look at the GDPR and asks if your organization is ready for it.

Added: October 21, 2018
image from Email Encryption Secure File Transfer Best Practice

Email Encryption Secure File Transfer Best Practice

This report provides a discussion about the best practices for Email encryption.

Added: October 21, 2018
image from Fine Determination

Fine Determination

This paper provides insight into specific fines that will occurr due to the GDPR.

Added: October 21, 2018
image from Innovation Insight For Unstructured Data Classification

Innovation Insight For Unstructured Data Classification

From the report, “The perpetually expanding volume and propagation of the unstructured data being stored and used by organizations is making information increasingly difficult to secure. Security and risk management leaders who implement data classification technologies will greatly enhance their chances of success.”

(more available)
Added: October 21, 2018
image from Modern Database Architecures Demand Modern Data Security Measures

Modern Database Architecures Demand Modern Data Security Measures

The objective of this report is to provide an understanding into how companies are approaching the challenges of evolving database ecosystems though cloud and big data initiatives. And to understand what steps organizations are taking to ensure greater security and compliance with their databases.

(more available)
Added: October 21, 2018
image from TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

This report provides an analysis of TPM Genie. TPM Genie is a serial bus interposer which has been designed to aid in the security research of Trusted Platform Module hardware. The tool demonstrates that a man-in- the-middle on the TPM serial bus can undermine many of the stated purposes of the TPM such as measured boot, remote attestation, sealed storage, and the hardware random number generator.

(more available)
Added: October 21, 2018
image from 2016 Global Encryption Trends Study

2016 Global Encryption Trends Study

The purpose of this research is to examine how the use of encryption has evolved over the past 11 years and the impact of this technology on the security posture of organizations. The first encryption trends study was conducted in 2005 for a US sample of respondents.3 Since then we have expanded the scope of the research to include respondents in all regions of the world.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 20:08 UTC (build b1d7be4)