Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Database

Below you will find reports with the tag of “Database”

image from Patrolling the Dark Net: What You Don't Know Will Hurt You

Patrolling the Dark Net: What You Don't Know Will Hurt You

This e-book provides good insight into understanding cyber crime.

Added: December 5, 2018
image from Advancing the Science of Collaborative Problem Solving

Advancing the Science of Collaborative Problem Solving

This paper presents the research that discusses the findings of a recent global test regarding the preparedness of individuals entering the workforce, to participate in collaborative problem solving. Of note, the report discusses that this problem is causing an inability to face cybersecurity threats.

(more available)
Added: December 5, 2018
image from Threatscape Of The US Election

Threatscape Of The US Election

From the report, “The cyber attacks targeting political elections is in full swing as the 115th United States midterm elections grow closer. The exploitation of vulnerabilities and direct cyber attacks targeting election-related entities are somewhat expected; however, a different form of cyber attack has the potential to have a disruptive impact to the elections: disinformation campaigns. The use of disinformation tactics in today’s social media-obsessed society is the most prominent threat to the democratic process. This form of attack is at a significant and troublesome level that the average voter may not be fully aware of.” Read on to learn more.

(more available)
Added: November 29, 2018
image from Biometrics And Privacy: On Device vs On Server matching

Biometrics And Privacy: On Device vs On Server matching

This paper sets out the key privacy implications of processing biometric data in the EU and Switzerland, Canada, USA and the Asia Pacific region (covering Japan, Singapore, Hong Kong and Australia). This paper will touch on legislation and best practice recommendations in these jurisdictions without going into the details of specific laws.

(more available)
Added: November 27, 2018
image from Why Device Age Matters

Why Device Age Matters

Cybercriminals will use any and all devices available to them in order to lie, cheat and steal from you. Until they’re blocked. Then they switch to different devices, counting on your fraud prevention efforts to forget about their old devices. When that happens, they start using their old devices again. They would love for you to believe that device history isn’t important. That’s why your fraud prevention tools shouldn’t forget older devices either. It’s essential to know when a device, especially one that’s new to your business, has a history of fraud. Even if that fraud happened years ago.

(more available)
Added: November 24, 2018
image from IT Talent Acquisition; the recruiter's view

IT Talent Acquisition; the recruiter's view

“This inaugural report looks at the in-house recruiter’s view of talent acquisition. Which recruitment channels get the most investment, what are the most effective tools and what would make acquisition easier?”

(more available)
Added: November 24, 2018
image from IT Talent Acquisition; the candidate's view

IT Talent Acquisition; the candidate's view

“This is the first in an annual report that looks at the candidate’s view of acquisition and retention. Where do candidates look for IT jobs, what makes them apply, why do they leave and why do they stay? Talent acquisition is often viewed from the recruiters perspective, but it can be revealing to view it from the other side of the table - the candidate - and analyse the differences. For example, in-house recruiters invest much in social media, listing it in 3rd place for the amount of time and money they spend. Yet it’s not the first port of call for IT candidates. As Chart I shows, few respond to IT jobs on Facebook or Twitter.”

(more available)
Added: November 24, 2018
image from IT Talent Acquisition; the recruiter's view

IT Talent Acquisition; the recruiter's view

This is our 2nd annual survey of the IT recruitment landscape. A lot has changed in the last 12 months. Social media and job boards are evolving and there seems to be fresh challenges in talent acquisition. This year Curo Talent® decided to look at how the views of hiring managers compared to the outlook of executives in the recruitment department. Naturally, there was a difference of opinion on some issues.

(more available)
Added: November 24, 2018
image from IT Talent Acquisition; the candidate's view

IT Talent Acquisition; the candidate's view

“In our 2nd annual survey of IT candidates, Curo Talent® decided to look at how the views of in-house recruiters compared to the outlook of IT candidates. Naturally, there was a difference of opinion on many issues.”

(more available)
Added: November 24, 2018
image from The Future of Digital Engagement In An Age of Compliance

The Future of Digital Engagement In An Age of Compliance

To find out how European enterprise customer data leaders are tackling this complex problem, Janrain conducted more than 50 interviews (see appendix 1 for interviewee profile), the findings of which are distilled into this eBook.

(more available)
Added: November 24, 2018
image from High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows.

(more available)
Added: November 24, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study: 2018

LexisNexis Risk Solutions Fraud Mitigation Study: 2018

Since 2015, LexisNexis Risk Solutions has administered an annual study to determine the extent to which fraud cases span multiple industries. The national online survey included 800 fraud mitigation professionals from five industry segments and government with oversight or direct involvement in fraud programs at their organizations. It has a margin of error of +/- three points (at the 95% confidence level), and LexisNexis was not identified as the research sponsor.

(more available)
Added: November 23, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study:2017

LexisNexis Risk Solutions Fraud Mitigation Study:2017

From the report, “Fraud from stolen identities or cyber attacks/hacking were the types of fraud most concerning to fraud mitigation professionals.” Read on to discover more.

(more available)
Added: November 23, 2018
image from SIEM For Beginners

SIEM For Beginners

Everything you wanted to know about log management but were afraid to ask.

Added: November 21, 2018
image from Healthcare's Most Wired: National Trends 2018

Healthcare's Most Wired: National Trends 2018

Historically, the annual Most Wired research has focused on measuring adoption of healthcare information technology to highlight those organizations with the broadest, deepest IT infrastructure. With the ever-growing need to improve healthcare, the research now adds a new emphasis on measuring key areas that can help advance the industry as well as on gathering information about organizations’ technology strategies (which include not just technology adoption but also the refinement of processes and the development of people). With this new focus, this year’s research and future Most Wired research can help identify gaps in healthcare organizations’ technology adoption and strategies and highlight areas in which the industry has opportunities to make progress.

(more available)
Added: November 21, 2018
image from CipherCloud Cloud Data Security Research

CipherCloud Cloud Data Security Research

In August 2018 CipherCloud completed a survey of key customers and cloud users that included responses from hundreds of enterprise corporations. This survey was designed to identify the key business drivers that were compelling to these users as justification for the protection of cloud data.

(more available)
Added: November 21, 2018
image from Quarterly Incident Response Threat Report: Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

Quarterly Incident Response Threat Report: Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

A trade war with China. A fragile agreement with North Korea. A growing fear of Russian hackers. Ahead of the 2018 U.S. midterm congressional elections, geopolitical conflict continues to play out in cyberspace.

(more available)
Added: November 21, 2018
image from Cloud Native Security Report: Watching The Honeypots

Cloud Native Security Report: Watching The Honeypots

This report is the first in a bi-annual series that examines risks and attacks in the cloud native computing ecosystem. The next report will be released in the first half of 2019.

(more available)
Added: November 20, 2018
image from Email and Internet Voting: The Overlooked Threat To Election Security

Email and Internet Voting: The Overlooked Threat To Election Security

This report reviews the research that has been conducted by the federal government concluding that secure online voting is not yet feasible. We examine the insoluble security problems that are inherent to casting ballots online, including server penetration attacks, client-device malware, attacks to emailed and faxed ballots in transit, denial-of-service attacks, disruption attacks and the challenge to reliably authenticate voters.

(more available)
Added: November 20, 2018
image from Understanding The Pending U.S. Data Breach Prevention and Compensation Act of 2018

Understanding The Pending U.S. Data Breach Prevention and Compensation Act of 2018

This special report provides information related to the Harbinger of a U.S. National Data Protection Law.

Added: November 20, 2018
image from Risk Management Playbook

Risk Management Playbook

The Third-Party Security Risk Management Playbook (Playbook) is the definitive study of third-party security risk management practices. Based on in-depth interviews of risk executives from 30 domestic and global firms, it reveals the real-world capabilities and practices employed to manage third-party cyber risk, distilled into 14 capabilities with 72 common, emerging, and pioneering practices.

(more available)
Added: November 16, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 08:08 UTC (build b1d7be4)