Below you will find reports with the tag of “Personal Data” Know Your Data To Create Actionable Policy Too often, security and risk (S&R) leaders create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data — from what data they have to where it resides. As a result, many policies are ineffective and can even hinder business processes. In today’s evolving data economy, data identity is the missing link that S&R leaders must define to create actionable policy. This report was designed to help S&R leaders develop effective policies using their Data Security And Control Framework as a guideline. (more available) Added: October 22, 2018 Multi-Factor Authentication For Dummies This e-book provides a helpful and simple explanation of Multi-Factor Authentication. Added: October 22, 2018 Securing A Digital Retail Enterprise This whitepaper explores the necessary steps for securing a retail enterprise in a digital world. Added: October 22, 2018 The Security Provisions OF GDPR The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice. (more available) Added: October 22, 2018 The Surge Of Cyber Threats: What Higher Education Needs To Know This report takes a specific look at cyber threats on the campuses of higher learning facilities. Added: October 22, 2018 Threat Advisory: Ticketac Mobile Apps This is a threat advisory for Ticketac Mobile Apps Added: October 22, 2018 Three Pillars For Successfully Addressing the GDPR This white paper offers you a strategic framework that can help your organization manage the complexity of GDPR and build an ongoing compliance program. (more available) Added: October 22, 2018 Three-Part Guide To Developing A BYOD Strategy This paper is subtitled “An IT Architect’s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy” Added: October 22, 2018 Virtualization's Hidden Traps This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany. (more available) Added: October 22, 2018 2015 Cost of Data Breach Study: Global Analysis In this report, they examine two factors that affected the financial consequences of a data breach. The first is executive involvement in their organization’s IT security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. (more available) Added: October 21, 2018 2018 Gambling Report iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018. (more available) Added: October 21, 2018 Bring Mac To The Enterprise With A Modern Approach To Management This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment. (more available) Added: October 21, 2018 Dealing With The New EU GDPR This paper takes a look at the GDPR and asks if your organization is ready for it. Added: October 21, 2018 Enterprise Mobile Security Pulse Report Q3 2017 This report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during application analysis. (more available) Added: October 21, 2018 Fine Determination This paper provides insight into specific fines that will occurr due to the GDPR. Added: October 21, 2018 Identity Theft In America This report provides an overlook at Identity Theft in America and how it can be prevented. Added: October 21, 2018 Innovation Insight For Unstructured Data Classification From the report, “The perpetually expanding volume and propagation of the unstructured data being stored and used by organizations is making information increasingly difficult to secure. Security and risk management leaders who implement data classification technologies will greatly enhance their chances of success.” (more available) Added: October 21, 2018 Mobile Wi-Fi Security Report This report is designed to inform you of the many dangers of Wi-Fi, and how to deal with them. Added: October 21, 2018 New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business This report provides insight into Australian Data Breach Protocol. Added: October 21, 2018 Smartly Selected Infrastructure For GDPR Compliance This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance. (more available) Added: October 21, 2018 The Value Of Data This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place. (more available) Added: October 21, 2018 «« « 11 12 13 14 15 » »»
Know Your Data To Create Actionable Policy Too often, security and risk (S&R) leaders create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data — from what data they have to where it resides. As a result, many policies are ineffective and can even hinder business processes. In today’s evolving data economy, data identity is the missing link that S&R leaders must define to create actionable policy. This report was designed to help S&R leaders develop effective policies using their Data Security And Control Framework as a guideline. (more available) Added: October 22, 2018
Multi-Factor Authentication For Dummies This e-book provides a helpful and simple explanation of Multi-Factor Authentication. Added: October 22, 2018
Securing A Digital Retail Enterprise This whitepaper explores the necessary steps for securing a retail enterprise in a digital world. Added: October 22, 2018
The Security Provisions OF GDPR The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice. (more available) Added: October 22, 2018
The Surge Of Cyber Threats: What Higher Education Needs To Know This report takes a specific look at cyber threats on the campuses of higher learning facilities. Added: October 22, 2018
Threat Advisory: Ticketac Mobile Apps This is a threat advisory for Ticketac Mobile Apps Added: October 22, 2018
Three Pillars For Successfully Addressing the GDPR This white paper offers you a strategic framework that can help your organization manage the complexity of GDPR and build an ongoing compliance program. (more available) Added: October 22, 2018
Three-Part Guide To Developing A BYOD Strategy This paper is subtitled “An IT Architect’s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy” Added: October 22, 2018
Virtualization's Hidden Traps This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany. (more available) Added: October 22, 2018
2015 Cost of Data Breach Study: Global Analysis In this report, they examine two factors that affected the financial consequences of a data breach. The first is executive involvement in their organization’s IT security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. (more available) Added: October 21, 2018
2018 Gambling Report iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018. (more available) Added: October 21, 2018
Bring Mac To The Enterprise With A Modern Approach To Management This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment. (more available) Added: October 21, 2018
Dealing With The New EU GDPR This paper takes a look at the GDPR and asks if your organization is ready for it. Added: October 21, 2018
Enterprise Mobile Security Pulse Report Q3 2017 This report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during application analysis. (more available) Added: October 21, 2018
Fine Determination This paper provides insight into specific fines that will occurr due to the GDPR. Added: October 21, 2018
Identity Theft In America This report provides an overlook at Identity Theft in America and how it can be prevented. Added: October 21, 2018
Innovation Insight For Unstructured Data Classification From the report, “The perpetually expanding volume and propagation of the unstructured data being stored and used by organizations is making information increasingly difficult to secure. Security and risk management leaders who implement data classification technologies will greatly enhance their chances of success.” (more available) Added: October 21, 2018
Mobile Wi-Fi Security Report This report is designed to inform you of the many dangers of Wi-Fi, and how to deal with them. Added: October 21, 2018
New Australian Data Breach Legislation: Guide To Auditing And Securing Your Business This report provides insight into Australian Data Breach Protocol. Added: October 21, 2018
Smartly Selected Infrastructure For GDPR Compliance This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance. (more available) Added: October 21, 2018
The Value Of Data This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place. (more available) Added: October 21, 2018