Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Consumer Security Risks Survey 2016

Consumer Security Risks Survey 2016

This report discusses four main findings; 1) Consumers are concerned about online threats to the people and things that matter most, 2) The dangers online can have severe consequences for people’s data, 3) Children are also exposed to online threats, 4) People should be more cyber savvy - and protect what matters most - when they are online.

(more available)
Added: October 15, 2018
image from Cyber Threats To The Entertainment And Media Industries

Cyber Threats To The Entertainment And Media Industries

Discover why the entertainment and media industries are valuable targets for APT groups and hacktivists seeking influence.

Added: October 15, 2018
image from Data Protection Under POPI

Data Protection Under POPI

This white paper provides insight into becoming complaint with South Africa’s Protection of Personal Information Bill. (POPI)

Added: October 15, 2018
image from Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

This project comprised two main research and development phases. The first phase of the project entailed a requirements analysis and architecture-design effort. For further details on this phase, please refer to the first study report. The second phase of the project entailed the development of a proof-of-concept toolbox. This report presents the proof-of-concept toolbox.

(more available)
Added: October 15, 2018
image from DMARC Intelligence Report 2016

DMARC Intelligence Report 2016

In this annual report, they track the progress of Domain-based Message Authentication, Reporting, and Conformance (DMARC)

Added: October 15, 2018
image from Email Fraud and DMARC Adoption Trends Second Half 2017

Email Fraud and DMARC Adoption Trends Second Half 2017

In this inaugural report, they take a look at the state of DMARC, leveraging Agari’s Email Threat Center, and its unique global and sector view into our customers’ DMARC traffic over the last 6 months of 2017. They also explore publicly available statistics and trends on DMARC usage. Finally, for a global view on email domains not visible to the Threat Center, they incorporate intelligence from Farsight Security, the world’s largest provider of historical and real-time passive DNS data. Farsight DNSDB provides an unmatched view into the diverse and often volatile DMARC policies located in global DNS records.

(more available)
Added: October 15, 2018
image from Email Fraud Threat Report Year In Review

Email Fraud Threat Report Year In Review

The details in this report are compiled from Proofpoint’s specific research and experience from the events of 2017.

Added: October 15, 2018
image from Enterprise IoT Security Blueprint: Requirements, Components, And Guidelines

Enterprise IoT Security Blueprint: Requirements, Components, And Guidelines

This paper provides a guide of all of the things an Enterprise should consider and implement in order to secure the Internet of Things.

(more available)
Added: October 15, 2018
image from Federal Information Security Modernization Act Report to Congress

Federal Information Security Modernization Act Report to Congress

The President of the United States’ Office of Management and Budget, prepared this report. This report covers the period from October 1, 2014, through September 30, 2015, and provides an update of ongoing information security initiatives, a review of Fiscal Year 2015 information security incidents, Inspector General assessments of agencies’ progress in implementing information security capabilities, and the Federal Government’s progress in meeting key information security performance measures based on agency submitted data.

(more available)
Added: October 15, 2018
image from GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 15, 2018
image from HTTPS/SSL White Paper

HTTPS/SSL White Paper

For many organizations, dealing with HTTPS traffic is something of a double edge sword. Recent moves to encryption challenge the status quo in terms of organizational oversight. Finding a balance between competing interests will be critical to moving forward, but while present technology limitations hamper those efforts, technological advancements can enhance them.

(more available)
Added: October 15, 2018
image from Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

This report takes a look at whaling attacks and considers what can be done to stop these kinds of attacks.

(more available)
Added: October 15, 2018
image from Mobile Banking Applications: Security Challenges For Banks

Mobile Banking Applications: Security Challenges For Banks

Accenture and NowSecure, Inc. analyzed the mobile banking app threat landscape based on industry research, customer-facing mobile banking app vulnerability assessments performed by NowSecure, and Accenture’s industry knowledge and experience working with banking institutions. They collaborated to create a report that was designed to provide an understanding of the current- state security environment for customer- facing mobile banking apps, as well as answer some key questions about the state of mobile banking app security.

(more available)
Added: October 15, 2018
image from Moving Beyond The Password: Consumers' Views On Authentication

Moving Beyond The Password: Consumers' Views On Authentication

In this research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S. consumers who use online and/or mobile banking in January 2017 to better understand their attitudes toward and understanding of various authentication mechanisms.

(more available)
Added: October 15, 2018
image from Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

System designers have long struggled with the challenge of determining how to control when untrusted applica- tions may perform operations using privacy-sensitive sen- sors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors. Proposed research methods enable systems to infer the op- erations associated with user input events, but malicious applications may still trick users into allowing unexpected, stealthy operations. To prevent users from being tricked, we propose to bind applications’ operation requests to the associated user input events and how they were ob- tained explicitly, enabling users to authorize operations on privacy-sensitive sensors unambiguously and reuse such authorizations.

(more available)
Added: October 15, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report May 2016

SecureWorks Threat Intelligence Executive Monthly Report May 2016

This report from May 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 15, 2018
image from Spear Phishing Report

Spear Phishing Report

This report takes a very deep look at the subject of Spear Phishing and the impact it is having on business.

(more available)
Added: October 15, 2018
image from State Of Privacy & Security Awareness In Retail

State Of Privacy & Security Awareness In Retail

This report provides data to help understand the need of helping employees understand PCI compliance in the retail industry.

Added: October 15, 2018
image from The Danger Within: Unmasking Insider Threats

The Danger Within: Unmasking Insider Threats

This eBook outlines the who, what, why and how of the insider threat to expose risks you may not be considering, and provides guidance to help you prevent and detect these costly attacks.

(more available)
Added: October 15, 2018
image from The Rise And Fall OF Scan4You

The Rise And Fall OF Scan4You

This is exclusive research into the cyber threat that is Scan4You. It discusses the history and current outcomes of this unique threat.

(more available)
Added: October 15, 2018
image from X-Force Threat Intelligence Index 2018

X-Force Threat Intelligence Index 2018

In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 57
  • 58
  • 59
  • 60
  • 61
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)