Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Personal Data

Below you will find reports with the tag of “Personal Data”

image from Incapsula Survey: What DDoS Attacks Really Cost Businesses

Incapsula Survey: What DDoS Attacks Really Cost Businesses

To determine real-world costs posed by DDoS attacks in 2014, Incapsula commissioned a survey to gauge real organizations’ experiences with them. By compiling these statistics, they hoped to provide some perspective. Additionally, they wanted to underscore the importance of investing in a truly impenetrable mitigation solution.

(more available)
Added: October 25, 2018
image from Investigation or Exasperation: The State of Security Operations

Investigation or Exasperation: The State of Security Operations

This Infographic lays out details of the State of Security Operations. It reveals data that discusses how much time and budget are being spent on cybersecurity issues.

(more available)
Added: October 25, 2018
image from Preparing For The EU General Data Protection Regulation

Preparing For The EU General Data Protection Regulation

This white paper prepares you for GDPR by providing a basic understanding of what is involved with the different sections of the regulations, and how technology can be used to drive the initial discovery which can be used to drive the plan as well as the ongoing process of maintaining compliance.

(more available)
Added: October 25, 2018
image from Rethink The Role Of The CMO

Rethink The Role Of The CMO

In February 2018, Accenture Interactive commissioned Forrester Consulting to evaluate the current and future role of the CMO in building and delivering experiences and the need for organizationwide collaboration. In July 2018, Forrester conducted 10 interviews and an online survey with 250 senior-level marketing decision makers from a range of industries to explore this topic.

(more available)
Added: October 25, 2018
image from Threat Advisory: Bluclub

Threat Advisory: Bluclub

This is a threat advisory for Bluclub.

Added: October 25, 2018
image from 2018 Cost Of A Data Breach Study: Global Overview

2018 Cost Of A Data Breach Study: Global Overview

IBM Security and Ponemon Institute are pleased to release the 2018 Cost of Data Breach Study: Global Overview1. They conducted interviews with more than 2,200 IT, data protection, and compliance professionals from 477 companies that have experienced a data breach over the past 12 months. According to the findings, data breaches continue to be costlier and result in more consumer records being lost or stolen, year after year.

(more available)
Added: October 24, 2018
image from 6 Questions To Ask Before Implementing A Vulnerability Disclosure Program

6 Questions To Ask Before Implementing A Vulnerability Disclosure Program

This guide provides some thoughts about implementing a Vulnerability Disclosure Program.

Added: October 24, 2018
image from Blackmoon Banking Trojan Overview

Blackmoon Banking Trojan Overview

The Blackmoon Banking Trojan was thought to be shut down in 2016. However, it has re-emerged. This paper provides a brief analysis of the revamped trojan.

(more available)
Added: October 24, 2018
image from CIO Survey 2018: The Transformational CIO

CIO Survey 2018: The Transformational CIO

In last year’s survey, Harvey Nash and KPMG reported how CIOs were holding a steady line in the face of global uncertainty, cutting costs and refining business processes. Whilst much of this geopolitical instability remains, this year’s report shows how CIOs are benefiting from bigger budgets and headcount growth. Indeed, more IT leaders are enjoying budget increases than we have seen in the last thirteen years of reporting.

(more available)
Added: October 24, 2018
image from Database Discovery: Identifying Hidden Risks and Sensitive Data

Database Discovery: Identifying Hidden Risks and Sensitive Data

Keeping track of databases, and the associated data they host, turns out to be a significant challenge. This white paper presents a detailed approach to understanding the difficulties related to database discovery, and some solutions to those problems.

(more available)
Added: October 24, 2018
image from Left Of Breach 2018

Left Of Breach 2018

Using a unique approach, this paper offers insight into how using a technique of Marine strategy can protect your company from Phishing attacks.

(more available)
Added: October 24, 2018
image from Phishing In The Age Of SaaS

Phishing In The Age Of SaaS

Phishing attacks have become the primary hacking method used against organizations. In the past, there was a tendency to blame the user, but attacks have evolved to appear so genuine that even the most security-savvy recipient can be fooled. Phishing attacks have recently experienced newfound success with the proliferation of SaaS in the workplace. This paper discusses what a company can do to deal with this new reality.

(more available)
Added: October 24, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

As stated in the report, “The purpose of this study is to shed light on the problem of medical data loss—how it is disclosed, who is causing it and what can be done to combat it.”

(more available)
Added: October 24, 2018
image from Revitalizing Privacy And Trust In A Data-Driven World

Revitalizing Privacy And Trust In A Data-Driven World

From the report, “Massive data breaches and the constant collection of personal information routinely spur debate on whether privacy, rooted in ancient times, is dead in teh digiatl age. Are we in a post-privacy world? In many ways, it is the wrong question. Privacy, security and trust-all increasingly at risk-are also more vital and intertwined in our data-driven society.

(more available)
Added: October 24, 2018
image from Securing Information In The Age Of Collaboration

Securing Information In The Age Of Collaboration

This report presents the results of a survey run by ESG and commissioned by Seclore. They analyze information related to data, data security, and collaboration.

(more available)
Added: October 24, 2018
image from The 5 Most Vulnerable Patient Handoff Scenarios

The 5 Most Vulnerable Patient Handoff Scenarios

Hospital communications have a major breakdown in patient handoff due to archaic communication devices. This report seeks to help solve that problem, while also discussing the security issues related to the new communication devices.

(more available)
Added: October 24, 2018
image from Threat Advisory: betFIRST mobile apps

Threat Advisory: betFIRST mobile apps

This is a threat advisory for betFIRST mobile apps

Added: October 24, 2018
image from Understanding The Mobile Threat Landscape In 2018

Understanding The Mobile Threat Landscape In 2018

“2017 was a huge year for mobile security. Malicious actors returned with a vengeance and cyber attacks grew rapidly in sophistication. Ransomware outbreaks like WannaCry and Petya hit enterprises globally causing unparalleled disruption, new vulnerabilities like BlueBorne were discovered and malware variants grew more aggressive and prevalent by the day. This report will summarise the key mobile security trends that emerged in 2017, and summarise thoughts for the mobile threat landscape for the year ahead.”

(more available)
Added: October 24, 2018
image from 2015 Global Threat Report

2015 Global Threat Report

This year’s CrowdStrike Intelligence Global Threat Report contains a wealth of intelligence regarding adversary behavior, capabilities, and intentions. More importantly, it ties it back to the events that influenced those activities. By understanding the events that shape the beliefs and motivations of threat actors—regardless if they are criminal, nation-state, or hacktivist—it is possible to comprehend what drove the adversaries to behave as they did, and perhaps to understand what this will mean for the future.

(more available)
Added: October 23, 2018
image from 2016 Cost of Data Breach Study: Global Analysis

2016 Cost of Data Breach Study: Global Analysis

This global study examines 383 companies in 12 countries. It finds that $4 million is the average total cost of a data breach. It sees a 29% increase in total costs of data breaches since 2013. It finds that $158 is the average cost per lost or stolen record. Finally, there has been a 15% increase in per capita cost since 2013.

(more available)
Added: October 23, 2018
image from 2016 Threat Predictions

2016 Threat Predictions

This report deals with predicting the cyber threat landscape for 2016 through 2020. It does this by looking back 5 years, and analyzing the past, and also talking to folks who make predictions for the 5 years in the future.

(more available)
Added: October 23, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 12:12 UTC (build 0d9043b)