Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Identity Theft

Below you will find reports with the tag of “Identity Theft”

image from What The Internet Of Things Means For Consumer Privacy

What The Internet Of Things Means For Consumer Privacy

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.

(more available)
Added: November 24, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study: 2018

LexisNexis Risk Solutions Fraud Mitigation Study: 2018

Since 2015, LexisNexis Risk Solutions has administered an annual study to determine the extent to which fraud cases span multiple industries. The national online survey included 800 fraud mitigation professionals from five industry segments and government with oversight or direct involvement in fraud programs at their organizations. It has a margin of error of +/- three points (at the 95% confidence level), and LexisNexis was not identified as the research sponsor.

(more available)
Added: November 23, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study:2017

LexisNexis Risk Solutions Fraud Mitigation Study:2017

From the report, “Fraud from stolen identities or cyber attacks/hacking were the types of fraud most concerning to fraud mitigation professionals.” Read on to discover more.

(more available)
Added: November 23, 2018
image from 2018 Unisys Security Index Australia Report

2018 Unisys Security Index Australia Report

This report provides insight into the public concern about security issues in Australia in 2018.

Added: November 21, 2018
image from Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information

This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events. The report should provide valuable information that can be used by businesses and policymakers as they develop policies and best prac-tices related to information security and data breach response. More- over, it should be of interest to individuals who conduct business with any organization that holds their personal and confidential data.

(more available)
Added: October 26, 2018
image from Cyber Update: 2015 Cyber Insurance Profits and Performance

Cyber Update: 2015 Cyber Insurance Profits and Performance

A total of 117 US insurers were found to have underwritten cyber insurance in 2015. This paper has analyzed these filings and has outlined them to provide insights for insurers that either currently offer or seek to offer cyber insurance to help them benchmark and drive decisions on underwriting and reinsurance purchase.

(more available)
Added: October 26, 2018
image from Healthcare Breach Report 2018

Healthcare Breach Report 2018

Bitglass’ fourth-annual Healthcare Breach Report analyzes data from the US Department of Health and Human Services’ “Wall of Shame,” where organizations that store or handle PHI are required to disclose breaches that affect at least 500 individuals. Read on to learn more about the breaches that caused the most damage in 2017 and to look at the year ahead in data security.

(more available)
Added: October 26, 2018
image from Threat Intelligence: Tax Related Scams Where Motive Meets Opportunity

Threat Intelligence: Tax Related Scams Where Motive Meets Opportunity

Root9B’s Vice President of Threat Intelligence, Keith Smith, sat down to highlight the threat of tax related scams using compromised business email accounts. He also offers some proactive steps your business can take to prevent security breaches and protect sensitive information during this year’s tax season.

(more available)
Added: October 26, 2018
image from 2016 Mining for Database Gold: Findings from 2016 Breach Level Index

2016 Mining for Database Gold: Findings from 2016 Breach Level Index

From the report, “Following are some of the most notable data breaches in 2016, including the number of compromised records, type of breach, and the BLI risk assessment score. The score is calculated based on factors such as the number of records breached, the source of the breach, and how the stolen information was used.”

(more available)
Added: October 25, 2018
image from 2018 Global Study On Application Security

2018 Global Study On Application Security

Ponemon Institute is pleased to present the findings of the 2018 Global Study on The State Application Security sponsored by Arxan Technologies. We surveyed 1,399 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses when running in unsecured environments and how they are addressing this risk in practice.

(more available)
Added: October 25, 2018
image from Healthcare Breach Report 2016: What a Difference a Year Makes

Healthcare Breach Report 2016: What a Difference a Year Makes

This report, answers the questions, “why are hackers now targeting healthcare data?” and, “how did they conduct large scale attacks that affected millions?” It also details how healthcare organizations can use a Cloud Access Security Broker to protect data in the cloud, enable secure BYOD and remain HIPAA compliant.

(more available)
Added: October 25, 2018
image from Threat Advisory: Bluclub

Threat Advisory: Bluclub

This is a threat advisory for Bluclub.

Added: October 25, 2018
image from 2015 First Half Review: Findings from the Breach Level Index

2015 First Half Review: Findings from the Breach Level Index

This is an in depth presentation of the data breaches that occurred in the first half of 2015. It contains very detailed graphics, charts, and analysis.

(more available)
Added: October 24, 2018
image from Examining The Costs and Causes of Cyber Incidents

Examining The Costs and Causes of Cyber Incidents

Researchers built a number of scanning devices using Raspberry Pi minicomputers and, by taking them out to athletic events and busy public spaces, found that tracking of individuals was possible.

(more available)
Added: October 23, 2018
image from The Security Provisions OF GDPR

The Security Provisions OF GDPR

The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice.

(more available)
Added: October 22, 2018
image from Identity Theft In America

Identity Theft In America

This report provides an overlook at Identity Theft in America and how it can be prevented.

Added: October 21, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

October 2015 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 19, 2018
image from 2015 Data Breach Industry Forecast

2015 Data Breach Industry Forecast

To help businesses understand implications of such changes and navigate the road ahead, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape. With this mindset, they also looked back at how our 2014 predictions played out.

(more available)
Added: October 15, 2018
image from Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

The Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data reveals that the majority of healthcare organizations represented in this study have experienced multiple data breaches. Despite the increased frequency of breaches, the study found that many organizations lack the money and resources to manage data breaches caused by evolving cyber threats, preventable mistakes, and other dangers.

(more available)
Added: October 15, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report July 2016

SecureWorks Threat Intelligence Executive Monthly Report July 2016

This report from July 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 13, 2025 04:08 UTC (build b1d7be4)