Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Disciplinary action

Below you will find reports with the tag of “Disciplinary action”

image from Identity and Access Management: The Stakeholder Perspective

Identity and Access Management: The Stakeholder Perspective

This report aims to capture hard data on the experiences of stakeholders who are impacted by IAM processes and technologies, and the impact of current IAM practices on security risks and business operations. (more available)
Added: February 22, 2021
image from The Economics of Security Operations Centers: What is the True Cost for Effective Results?

The Economics of Security Operations Centers: What is the True Cost for Effective Results?

Ponemon Institute is pleased to present the findings on the economics of today’s Security Operations Centers (SOC). Sponsored by Respond Software, Ponemon Institute surveyed 637 IT and IT security practitioners in organizations that have a SOC and are knowledgeable about cybersecurity practices in their organizations. (more available)
Added: March 29, 2020
image from The Ultimate Guide to Incident Management for Higher Education

The Ultimate Guide to Incident Management for Higher Education

This report offers insight for institutions of higher learning seeking to understand that regulations and issues surrounding cybersecurity on campus.
Added: March 7, 2019
image from Life Inside The Perimeter: Understanding The Modern CISO

Life Inside The Perimeter: Understanding The Modern CISO

Nominet commissioned Osterman Research to conduct a survey of 408 CISOs overseeing security for organisations with a mean average of 8,942 employees. (more available)
Added: February 17, 2019
image from Detecting and Stopping Famous Insider Attacks through Behavioral Analytics

Detecting and Stopping Famous Insider Attacks through Behavioral Analytics

This paper is a theoretical study looking at three famous cases of insider attacks that occurred over the past six years. (more available)
Added: February 5, 2019
image from The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The recent escalation in tensions between the United States and Turkey over the detention of pastor Andrew Brunson, have prompted Turkish patriotic hacktivist groups to target American websites. (more available)
Added: November 29, 2018
image from High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

High-value, Complex Clinical Workflows Require Enhanced Communications Capabilities

Spyglass Consulting Group conducted a primary research study to identify the market opportunities and challenges for healthcare provider organizations to leverage an enterprise-class secure communications platform to address the communications requirements associated with complex clinical workflows. (more available)
Added: November 24, 2018
image from Custom Applications and laaS Trends 2017

Custom Applications and laaS Trends 2017

“Enterprises rely on custom applications to perform business-critical functions. Any downtime could halt operations. Our survey found that while enterprises have confidence in the security of IaaS providers’ underlying infrastructure compared with their own datacenters, data in custom applications is exposed to a wide range of threats independent of the platform. (more available)
Added: October 23, 2018
image from Fine Determination

Fine Determination

This paper provides insight into specific fines that will occurr due to the GDPR.
Added: October 21, 2018
image from How Boards of Directors Really Feel About Cyber Security Reports

How Boards of Directors Really Feel About Cyber Security Reports

This paper sets out to reveal if IT data reported to boards of directors, enables them to make good decisions.
Added: October 21, 2018
image from Evolution Of Cloud In Education

Evolution Of Cloud In Education

Vector Consulting was commissioned by Cisco Australia and New Zealand to better understand the role and impact of cloud in higher education and training. (more available)
Added: October 14, 2018
image from Cyber Attacks: Power Failure Implications

Cyber Attacks: Power Failure Implications

A paper discussing the impact of a cyber attack on the power grid.
Added: October 13, 2018
image from Cyber Security Economic Issues

Cyber Security Economic Issues

The emerging field of cybersecurity economics could benefit from better data, better under- standing, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. (more available)
Added: October 13, 2018
image from The Enterprise Lacks A Big Data Strategy For IoT Transformation

The Enterprise Lacks A Big Data Strategy For IoT Transformation

From the report, “Internet of Things (IoT) technology holds incredible promise for transforming the enterprise, but one of the biggest hurdles for companies implementing IoT will be extracting insight from the incredible volumes of fast-moving data these systems produce and integrating that resulting intelligence into business processes in real time. (more available)
Added: October 13, 2018
© Cyentia Institute 2023
Library updated: February 1, 2023 04:08 UTC (build 051771c)