Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Database

Below you will find reports with the tag of “Database”

image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

As stated in the report, “The purpose of this study is to shed light on the problem of medical data loss—how it is disclosed, who is causing it and what can be done to combat it.”

(more available)
Added: October 24, 2018
image from Web Application Firewalls:Securing Modern Web Applications

Web Application Firewalls:Securing Modern Web Applications

This report is intended to help you get up to speed on the latest developments in the WAF space, to better understand how you can incorporate and integrate WAF technology with your existing and planned technology deployments, including cloud, on-premises, and hybrid topologies.

(more available)
Added: October 24, 2018
image from 6 Principles For DevOps Security At Scale

6 Principles For DevOps Security At Scale

DevOps and security leaders recognize that DevOps requires a fresh approach to security that mitigates risk and uncertainty without impairing velocity. This e-book presents six guiding principles for enabling DevOps security at scale.

(more available)
Added: October 23, 2018
image from Achieving Cyber Resilience

Achieving Cyber Resilience

This paper lays out the appropriate steps companies should take to protect their business from cyber attacks and ransomware.

Added: October 23, 2018
image from DDoS Glossary Of Terms

DDoS Glossary Of Terms

This Distributed Denial of Service (DDoS) attack glossary is intended to provide a high level overview of the various DDoS attack types and typical DDoS attack characteristics.

(more available)
Added: October 23, 2018
image from GDPR Advisory #1: Protecting The Pathways To Personal Information

GDPR Advisory #1: Protecting The Pathways To Personal Information

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 23, 2018
image from Ironclad API's:An Approach For Application Security Testing

Ironclad API's:An Approach For Application Security Testing

This paper discusses some API’s and how you can protect them from an attack.

Added: October 23, 2018
image from Is Data The New Endpoint

Is Data The New Endpoint

This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured.

(more available)
Added: October 23, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of various mobile app security methods including per-app VPN, containers, and micro-segmentation.”

(more available)
Added: October 23, 2018
image from PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

While a data loss incident can be a disaster for an organization’s reputation, there is now a new imperative around inbound information as well. Unwanted data acquisition can create problems just as much as data leaving the organization. There are a couple of scenarios which should be considered. Read this paper to know more.

(more available)
Added: October 23, 2018
image from Stacking The Odds Against The Fraud

Stacking The Odds Against The Fraud

This paper provides answers for how marketing and fraud can work together to help online gambling operators to win.

Added: October 23, 2018
image from Understanding The Insider Threat And How To Mitigate It

Understanding The Insider Threat And How To Mitigate It

This paper is intended to give a high-level view on the insider threat for those looking to implement a defensive programme. It considers the types of attack that may take place and some of the common weaknesses that aid insider attacks. It also covers some of the policies and controls that can be implemented to detect, deter or defend against the insider threat. This paper is intended to be a summary, however, the final section details further reading and resources that provide more in-depth information.

(more available)
Added: October 23, 2018
image from 6 Key Use Cases For Securing Your Organizations Cloud Workloads

6 Key Use Cases For Securing Your Organizations Cloud Workloads

This ebook lays out several examples of how to effectively secure your cloud workloads.

Added: October 22, 2018
image from AWS vs. Azure vs. Google: 10 Ways To Choose The Right DataCloud Center For You

AWS vs. Azure vs. Google: 10 Ways To Choose The Right DataCloud Center For You

This is an e-Book that provides 10 ways to pick the right datacloud center.

Added: October 22, 2018
image from GDPR An Action Plan For Cloud Readiness

GDPR An Action Plan For Cloud Readiness

This E-Book discusses ways to become GDPR Compliant.

Added: October 22, 2018
image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. Program research is supported by government agencies, foundations, and the private sector.

(more available)
Added: October 22, 2018
image from Privileged Access Security For Dummies

Privileged Access Security For Dummies

This is a handy and simple guide for helping individuals understand and implement Privileged Access Security.

Added: October 22, 2018
image from The Security Provisions OF GDPR

The Security Provisions OF GDPR

The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice.

(more available)
Added: October 22, 2018
image from Threat Actor - APT28

Threat Actor - APT28

This report takes a look at ATP28 a recognized state sponsored threat actor operating out of Russia.

Added: October 22, 2018
image from Unlocking B2B SaaS Growth With Identity Management

Unlocking B2B SaaS Growth With Identity Management

SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.

(more available)
Added: October 22, 2018
image from 2018 Gambling Report

2018 Gambling Report

iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018.

(more available)
Added: October 21, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 08:08 UTC (build b1d7be4)