Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Personal Data

Below you will find reports with the tag of “Personal Data”

image from Don't Compromise On Identity Because Of GDPR Compliance

Don't Compromise On Identity Because Of GDPR Compliance

This paper offers a helpful checklist for making sure you do not compromise your identity management for the sake of GDPR compliance.

(more available)
Added: October 19, 2018
image from Mobile Leak Report 2017

Mobile Leak Report 2017

This report calls itself “The Panama Papers” of mobile leak reporting.

Added: October 19, 2018
image from Network Detection: What Is It Really?

Network Detection: What Is It Really?

This report seeks to help provide important information to clarify what cybersecurity organizations are truly offering.

Added: October 19, 2018
image from Overcoming GDPR Compliance Challenges

Overcoming GDPR Compliance Challenges

This report introduces GDPR and the challenges that are involved and then discusses measures that organisations can take in order to boost their data protection capabilities. It also looks at the pitfalls to avoid as they can derail the overall programme. It is intended for those organisations that are working down the path to compliance and that are looking for guidance in how compliance can be achieved.

(more available)
Added: October 19, 2018
image from Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Ever since the new European regulation on the protection of personal data (GDPR) was voted in, businesses have started their countdown to the transition that will take place in May 2018. They now have less than 2 years to comply with the new European regulation and the consequences of its new requirements in terms of data protection: strengthened cybersecurity, liability of data collection entities and new mandatory procedures. For organizations, what this entails now is the need to review their procedures and ensure their regulatory compliance before it starts raining sanctions.This white paper aims to address the question by providing a simplified interpretation of the regulation and practical solutions for a smooth transition.

(more available)
Added: October 19, 2018
image from The Emotional Side of Virtualization

The Emotional Side of Virtualization

Virtualization is a strategic priority at large companies, and trust plays a crucial role in their choice of cloud service provider and in determining the type of data they store outside company infrastructure, according to a Bitdefender survey of 503 IT decision makers at companies in the US, the UK and Germany with more than 1,000 PCs. Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment, and CIOs have to adapt to the new world. This survey, carried out by iSense Solutions, reveals why companies virtualize, which countries CIOs trust and what kind of data companies care most about.

(more available)
Added: October 19, 2018
image from Untangling CIPA

Untangling CIPA

This paper takes a look at the Children’s Internet Protection Act.

Added: October 19, 2018
image from 2016 Web Application Threat Trend Report

2016 Web Application Threat Trend Report

Readers are encouraged to use this report to get a better understanding of the current threat landscape, including trends specific to different contexts like region, time of day, industry, and more, in order to better fine-tune defenses for meeting the security needs of their unique environments.

(more available)
Added: October 18, 2018
image from A Frictionless Automotive Ecosystem

A Frictionless Automotive Ecosystem

The advent of the connected car has thrust the automotive industry into a new competitive arena – that of data-driven services and value. This represents a sea of change for the industry, and the stakes are enormous. Today’s consumers expect to be able to connect to their world any-time from anywhere, including from their cars. This, in turn, is driving the need for auto manufacturers to offer more and more connectivity options. Manufacturers that handle these expectations well stand to build owner loyalty, increase customer touch points and ultimately sell more vehicles. Those that do not take this approach risk sowing disappointment and losing hard-won customers.

(more available)
Added: October 18, 2018
image from Are Your Employees A Cybersecurity Risk?

Are Your Employees A Cybersecurity Risk?

Today’s threat landscape is rapidly evolving, which means it is simply not enough for organizations to roll out an annual security training program and then pat themselves on the back for a job well done. Companies need to consistently invest in training and keep their employees updated on the latest vulnerabilities.

(more available)
Added: October 18, 2018
image from Behind our Digital Doors: Cybersecurity & the Connected Home

Behind our Digital Doors: Cybersecurity & the Connected Home

In support of National Cyber Security Awareness Month (October), ESET® and the National Cyber Security Alliance (NCSA) commissioned a survey to better understand the role of cybersecurity in the American household, providing an inside-look into how it is adapting in the digital era of the data breach. Given the simultaneous rise in our number of connected devices and cyber threats, this survey underlined the importance of cybersecurity as a core commitment in our digital lives. This paper discusses the findings of that survey.

(more available)
Added: October 18, 2018
image from Bridging The IoT Perception Gap:Information Vs. Operational Technology

Bridging The IoT Perception Gap:Information Vs. Operational Technology

This report is based on a survey that was conducted to observe the differing views and opinions of IT and OT teams.

(more available)
Added: October 18, 2018
image from CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

What do business leaders make of security? How do they perceive its practice and importance? Where are the gaps between business and security leaders? Part two of the CyberArk Global Advanced Threat Landscape Report 2018 explores these issues via responses from individuals including IT security decision-makers and line of business owners, from organizations ranging in size from 500 employees to 5,000 or more workers.

(more available)
Added: October 18, 2018
image from GDPR Compliancy: A Global Change Is On Its Way

GDPR Compliancy: A Global Change Is On Its Way

In this short article, they provide a quick ability to understand the GDPR and how it will impact the world.

(more available)
Added: October 18, 2018
image from How To Mitigate Five IT Problems Affecting The Financial Industry

How To Mitigate Five IT Problems Affecting The Financial Industry

Read this whitepaper to see how you can mitigate the following five financial services industry IT challenges. Minimize breaches, reduce cyber theft, use technology to improve network performance, improve compliance, and leverage technology to provide a competitive advantage.

(more available)
Added: October 18, 2018
image from Managing IoT In Higher Education

Managing IoT In Higher Education

This paper examines the struggle that Universities and Campuses have with students and the Interent Of Things.

Added: October 18, 2018
image from Personalisation Opportunities In Retail Stores Enhancing Customer Experience Through Location-based Analytics

Personalisation Opportunities In Retail Stores Enhancing Customer Experience Through Location-based Analytics

This report takes a look at the future of the retail industry and how an organizations network can assist with customer experience.

(more available)
Added: October 18, 2018
image from Strategies For Archiving In Hybrid Environments

Strategies For Archiving In Hybrid Environments

This white paper discusses the key issues facing corporate decision makers surrounding archiving requirements and the location of their data. The paper also discusses some of the results of an in-depth survey of content archiving decision makers and influencers in mid-sized and large organizations that was conducted during August 2017.

(more available)
Added: October 18, 2018
image from Threat Advisory: Skyscape

Threat Advisory: Skyscape

This is a threat advisory for Skyscape

Added: October 18, 2018
image from 2017 State Of Privacy Security Awareness

2017 State Of Privacy Security Awareness

This report offers analysis of survey results that sought to understand that the general public knows about privacy and cybersecurity.

(more available)
Added: October 17, 2018
image from 3 Must Have Ways To Analyze Mobile For GDPR Compliance

3 Must Have Ways To Analyze Mobile For GDPR Compliance

This paper seeks to aid organizations with analyzing mobile use and GDPR Compliance.

Added: October 17, 2018
  • ««
  • «
  • 13
  • 14
  • 15
  • 16
  • 17
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 00:12 UTC (build 0d9043b)