Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Database

Below you will find reports with the tag of “Database”

image from GDPR White Paper

GDPR White Paper

This paper takes a good and definitive look at the GDPR.

Added: October 12, 2018
image from Legal Cybersecurity Checklist

Legal Cybersecurity Checklist

This whitepaper seeks to provide aid to lawfirms and their need for security compliance with their clients.

Added: October 12, 2018
image from Network Threat Detection

Network Threat Detection

This report aims to compare the effectiveness of a selection of threat detection appliances. The products were exposed to internet threats that were live during the test period, as well as crafted exploit-based attacks.

(more available)
Added: October 12, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report August 2016

SecureWorks Threat Intelligence Executive Monthly Report August 2016

This report from August 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 12, 2018
image from Securing Hybrid Cloud Environments And Workloads On Amazon Web Services (AWS)

Securing Hybrid Cloud Environments And Workloads On Amazon Web Services (AWS)

The goal of this report is to help organizations that have both onsite and cloud based assests.

Added: October 12, 2018
image from SQL Injection Defense: There are no Silver Bullets

SQL Injection Defense: There are no Silver Bullets

In this technical whitepaper they explain why there’s no single silver bullet answer to SQL injection.

Added: October 12, 2018
image from Tackling Data Privacy To Unlock The Power Of Big Data Analytics

Tackling Data Privacy To Unlock The Power Of Big Data Analytics

From the report, “Overall, the power of big data analytics is clear, but some fundamental building blocks need to be in place if banks are to unlock that power for commercial benefit.”

(more available)
Added: October 12, 2018
image from Ten Key Questions on Cyber Risk and Cyber Risk Insurance

Ten Key Questions on Cyber Risk and Cyber Risk Insurance

By providing an overview of the main areas of research and the key studies conducted in the field to date, and by making some initial recommendations about the potential role of insurers and governments in addressing cyber risks, this report lays the groundwork for discussion and future research on the development of the cyber risk and the cyber insurance market.

(more available)
Added: October 12, 2018
image from The Dangers Of Smart City Hacking

The Dangers Of Smart City Hacking

This paper offers insight into smart cities and the dangers of exposed devices on the network.

Added: October 12, 2018
image from The GDPR: An Action Guide

The GDPR: An Action Guide

This is a recently updated eBook that lays out an action guide for compliance with the EU’s GDPR.

Added: October 12, 2018
image from Using Deception to Hunt Cyber Attackers

Using Deception to Hunt Cyber Attackers

From the report, “Today, there are a great many detection (identification and tracking) tools. However, there is not enough emphasis on trapping, resulting in a lack of effective trapping tools and techniques. An effective technique for automating the tracking of cyber attackers and, once found, trapping them, is deception. When implemented well, deception can automate and scale the hunting process, accurately identifying and tracking attackers, and trapping them to protect valuable assets while reducing valuable human resources in this never-ending competition of wits.”

(more available)
Added: October 12, 2018
  • ««
  • «
  • 13
  • 14
  • 15
  • 16
  • 17
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 16:09 UTC (build b1d7be4)