Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Protection

Below you will find reports with the tag of “Data Protection”

image from A Unified Approach To Rugged Device Management

A Unified Approach To Rugged Device Management

This whitepaper will delve into the evolution of rugged devices, the management challenges associated with such deployments, and how a UEM solution can address these challenges to enable a fully connected environment that is both manageable and secure.

(more available)
Added: October 20, 2018
image from 5 Ways To Strengthen Your SaaS Security And Build Customer Loyalty

5 Ways To Strengthen Your SaaS Security And Build Customer Loyalty

This is a 10 page guide that considers things that you can do to strengthen your SaaS security while not offending your customers.

(more available)
Added: October 19, 2018
image from Overcoming GDPR Compliance Challenges

Overcoming GDPR Compliance Challenges

This report introduces GDPR and the challenges that are involved and then discusses measures that organisations can take in order to boost their data protection capabilities. It also looks at the pitfalls to avoid as they can derail the overall programme. It is intended for those organisations that are working down the path to compliance and that are looking for guidance in how compliance can be achieved.

(more available)
Added: October 19, 2018
image from Path To MSSP

Path To MSSP

This whitepaper seeks to provide clarity over what “managed security service provider” status means, and whether customers are even concerned about it.

(more available)
Added: October 19, 2018
image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from Data Protection By Design

Data Protection By Design

This paper provides a brief summary of the necessary preparations for becoming GDPR Compliant

Added: October 17, 2018
image from An Emprical Analysis of Cyber Security Incidents at a Large Organization

An Emprical Analysis of Cyber Security Incidents at a Large Organization

This is a study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer.

(more available)
Added: October 16, 2018
image from Growing Disaster Recovery Needs Change the Role of Data Backup

Growing Disaster Recovery Needs Change the Role of Data Backup

Data protection in the form of backup and recovery remains one of the key tools in a company’s disaster recovery/business continuity toolbox. However, the increasing adoption of cloud-based IT options has also added a new set of challenges for managing and protecting business processes that can extend beyond the datacenter. There’s an increasing need for contingency plans that address the potential loss of mission-critical services, as well as the applications and data itself.

(more available)
Added: October 16, 2018
image from Leadership Compass: Cloud Access Security Brokers

Leadership Compass: Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

(more available)
Added: October 15, 2018
image from The GDPR:Key Themes And Challenges

The GDPR:Key Themes And Challenges

This helpful report provides analysis of the GDPR, some misconceptions, and some helpful tips for becoming compliant.

Added: October 15, 2018
image from Threat Advisory: iCare Leak

Threat Advisory: iCare Leak

This is a threat advisory for iCare Leak

Added: October 15, 2018
image from 2017 IT Security Privacy Survey

2017 IT Security Privacy Survey

When tackling cyber risk, board involvement and effective communication continue to drive performance. Learn more in this report on the key findings from Protiviti’s 2017 Security and Privacy Survey.

(more available)
Added: October 14, 2018
image from Android Is Ready For The Enterprise

Android Is Ready For The Enterprise

This report offers insight into Android and its use in the modern enterprise.

Added: October 14, 2018
image from Secure The Vote With Zero Trust Security

Secure The Vote With Zero Trust Security

This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers.

Added: October 14, 2018
image from Data Centric Approach To Endpoint Secuirty

Data Centric Approach To Endpoint Secuirty

This paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the reange of considerations and concrete next steps in the decision-making process.

(more available)
Added: October 13, 2018
image from The EU General Data Protection Regulation

The EU General Data Protection Regulation

This whitepaper discusses what the General Data Protection Regulation (GDPR) will mean to organizations globally.

Added: October 13, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 20:08 UTC (build b1d7be4)