Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Intellectual Property

Below you will find reports with the tag of “Intellectual Property”

image from State Of Executive Cybersecurity Awareness

State Of Executive Cybersecurity Awareness

From the report, “Let’s face it: senior leaders at organizations across the globe are already pressed for their time and attention. Today’s changing threat landscape requires executives and managers to fundamentally rethink their approach when it comes to addressing and mitigating cyber-risk. With the growth in cloud, mobile, and IoT, combined with employee and supply chain access to critical data and intellectual property, security and privacy awareness is now front and center for executives in the fight against cyberthreats. Yet finding the time for executives to effectively educate themselves in order to prevent cyberthreats continues to be a challenge. Take a look [in the report and discover] how executives and managers across various industries compared to the general population in terms of their knowledge of cybersecurity and data privacy best practices.”

(more available)
Added: February 18, 2019
image from 2018 Legal Threat Report

2018 Legal Threat Report

From the one page report, “From trade secrets to client information, legal services and law firms have an ethical and legal obligation to protect privileged data. To help you understand the common attack types and trends facing the legal industry, we’ve compiled the following observations based on real data from across our client base.”

(more available)
Added: February 5, 2019
image from 2018 Healthcare Threat Report

2018 Healthcare Threat Report

From this one page report, “Healthcare organizations possess some of the most valuable information exchanged on the black market, including social security numbers, patient records, financial information and intellectual property. To help you understand the common attack types and trends facing the healthcare industry, we’ve compiled the following observations based on real data from across our client base.”

(more available)
Added: February 5, 2019
image from Cybersecurity During A Merger

Cybersecurity During A Merger

Cybersecurity has emerged as a key risk factor to be weighed during the due diligence process of any merger and acquisition. How should organizations on both sides approach the process? Steve Chabinsky of CrowdStrike shares his thoughts on strategy for assessing cyber risk during the M&A due diligence process.

(more available)
Added: January 1, 2019
image from Too Much Information

Too Much Information

In this research, Digital Shadows assessed the sensitive data exposed from some of the most ubiquitous file sharing services across the Internet. We found over twelve petabytes of publicly available data across open Amazon S3 buckets, rsync, SMB, FTP servers, misconfigured websites, and NAS drives.

(more available)
Added: December 5, 2018
image from The ISACA/CMMI Institute Cybersecurity Culture Report: Narrowing The Culture Gap For Better Business Results

The ISACA/CMMI Institute Cybersecurity Culture Report: Narrowing The Culture Gap For Better Business Results

This paper aims to provide help in understanding how to better the cybersecurity culture in an organization.

Added: December 4, 2018
image from IT Talent Acquisition; the recruiter's view

IT Talent Acquisition; the recruiter's view

“This inaugural report looks at the in-house recruiter’s view of talent acquisition. Which recruitment channels get the most investment, what are the most effective tools and what would make acquisition easier?”

(more available)
Added: November 24, 2018
image from IT Talent Acquisition; the candidate's view

IT Talent Acquisition; the candidate's view

“This is the first in an annual report that looks at the candidate’s view of acquisition and retention. Where do candidates look for IT jobs, what makes them apply, why do they leave and why do they stay? Talent acquisition is often viewed from the recruiters perspective, but it can be revealing to view it from the other side of the table - the candidate - and analyse the differences. For example, in-house recruiters invest much in social media, listing it in 3rd place for the amount of time and money they spend. Yet it’s not the first port of call for IT candidates. As Chart I shows, few respond to IT jobs on Facebook or Twitter.”

(more available)
Added: November 24, 2018
image from IT Talent Acquisition; the recruiter's view

IT Talent Acquisition; the recruiter's view

This is our 2nd annual survey of the IT recruitment landscape. A lot has changed in the last 12 months. Social media and job boards are evolving and there seems to be fresh challenges in talent acquisition. This year Curo Talent® decided to look at how the views of hiring managers compared to the outlook of executives in the recruitment department. Naturally, there was a difference of opinion on some issues.

(more available)
Added: November 24, 2018
image from IT Talent Acquisition; the candidate's view

IT Talent Acquisition; the candidate's view

“In our 2nd annual survey of IT candidates, Curo Talent® decided to look at how the views of in-house recruiters compared to the outlook of IT candidates. Naturally, there was a difference of opinion on many issues.”

(more available)
Added: November 24, 2018
image from IT Forecast 2017; UK Trends and Challenges

IT Forecast 2017; UK Trends and Challenges

This report is based on independent research conducted by Smith & Harwood on behalf of Curo Talent®. We started by asking a simple question, “What has been your organisation’s technology focus for 2016?”

(more available)
Added: November 24, 2018
image from SIEM For Beginners

SIEM For Beginners

Everything you wanted to know about log management but were afraid to ask.

Added: November 21, 2018
image from University Challenge: Cyber Attacks In Higher Education

University Challenge: Cyber Attacks In Higher Education

A report by VMware exploring the evolving threat for UK universities and how they can guard against cyber attacks to preserve their intellectual property

(more available)
Added: November 6, 2018
image from 2016 Cyber Claims Study

2016 Cyber Claims Study

This report is an annual Cyber Claims Study. It includes informative numerical and graphical descrip-tions of the types of data exposed, causes of loss, business sectors involved, sizes of affected organizations, insider involvement, and third party involvement. It also includes several new analyses: Cloud Involvement, Cyber Extortion/Ransomware, Phishing, Phishing and Wire Transfer Fraud, POS-Related/Common Point of Purchase/CPP Investigations.

(more available)
Added: October 26, 2018
image from A Survival Guide To Using GPL

A Survival Guide To Using GPL

This white paper discusses the principals of the GNU Public License (GPL), the risks of using GPL-licensed code, and how GPL code may be used in proprietary products while minimizing legal compliance issues.

(more available)
Added: October 26, 2018
image from Cyber Threats To The Aerospace And Defense Industries

Cyber Threats To The Aerospace And Defense Industries

Read about the threat outlook for aerospace and defense sectors as threat groups seek to gain military and economic advantages.

(more available)
Added: October 26, 2018
image from Rethinking Data Security With A Risk Adaptive Approach

Rethinking Data Security With A Risk Adaptive Approach

This report discusses the idea that there needs to be a paradigm shift in the approach to cybersecurity. It posits that the shift should occur by studing human behavior and interaction with data.

(more available)
Added: October 26, 2018
image from Turnaround And Transformation In Cybersecurity 2015

Turnaround And Transformation In Cybersecurity 2015

This paper is based on the findings of a worldwide study.

Added: October 26, 2018
image from 2015 Cyber Claims Study

2015 Cyber Claims Study

The fifth annual NetDiligence® Cyber Claims Study uses actual cyber liability insurance reported claims to illuminate the real costs of incidents from an insurer’s perspective. Our goal is to raise awareness about cyber risk within the risk manager community.

(more available)
Added: October 25, 2018
image from Cybercrime against Businesses, 2005

Cybercrime against Businesses, 2005

This article, edited in 2008, compiles a list of cyber crimes that impacted business in 2005.

Added: October 25, 2018
image from Incapsula Survey: What DDoS Attacks Really Cost Businesses

Incapsula Survey: What DDoS Attacks Really Cost Businesses

To determine real-world costs posed by DDoS attacks in 2014, Incapsula commissioned a survey to gauge real organizations’ experiences with them. By compiling these statistics, they hoped to provide some perspective. Additionally, they wanted to underscore the importance of investing in a truly impenetrable mitigation solution.

(more available)
Added: October 25, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)