Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Personal Data

Below you will find reports with the tag of “Personal Data”

image from Annual Information Security Report 2015

Annual Information Security Report 2015

This “Information Security Report 2015” presents the Fujitsu Group’s information security-related activities.

Added: October 17, 2018
image from Assessing Russian Activities and Intentions in Recent US Elections

Assessing Russian Activities and Intentions in Recent US Elections

This is a declassified version of a highly classified assessment that has been provided to the President and to recipients approved by the President.

(more available)
Added: October 17, 2018
image from Building A Threat Intelligence Programme UK Edition

Building A Threat Intelligence Programme UK Edition

The report is based on research findings on the best practices and impacts of building a threat intelligence programme.

Added: October 17, 2018
image from Cloud And The Financial Sector: Breaking Down The Barriers To Adoption

Cloud And The Financial Sector: Breaking Down The Barriers To Adoption

This report takes a look at the key factors hindering the adoption of cloud security in the financial sector.

Added: October 17, 2018
image from Cyber-Security Perceptions And Realities: A View From The C-Suite

Cyber-Security Perceptions And Realities: A View From The C-Suite

This Report is based on the findings of a survey that sought to understand the priorities and viewpoint of the Executive members of multiple organizations around the world, as pertains to cyber-secuirty issues.

(more available)
Added: October 17, 2018
image from CyberArk Global Advanced Threat Landscape Report 2018

CyberArk Global Advanced Threat Landscape Report 2018

According to the 11th annual CyberArk Global Advanced Threat Landscape Report, while organizations face diverse, dynamic and increasingly damaging cyber security threats, many remain hamstrung by inertia and uncertainty. This is the third and final installment of the 2018 report, which is the result of responses from 1,300 IT professionals, business leaders, application developers and DevOps practitioners from seven countries.

(more available)
Added: October 17, 2018
image from Data Protection By Design

Data Protection By Design

This paper provides a brief summary of the necessary preparations for becoming GDPR Compliant

Added: October 17, 2018
image from GDPR: A Europe Based Regulation With A Global Impact

GDPR: A Europe Based Regulation With A Global Impact

This report takes a look at the GDPR, and what it means for the world.

Added: October 17, 2018
image from Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

This guide provides an overview of connected or IoT medical devices, their benefits and risks, real life use cases and best practice security guidelines.

(more available)
Added: October 17, 2018
image from State Of Enterprise Resource Planning In Cloud Security

State Of Enterprise Resource Planning In Cloud Security

The main objective of the document is to provide a brief introduction to cloud ERP security. The targeted audience of this document includes IT and management professionals who oversee the business IT assets of their respective organizations.

(more available)
Added: October 17, 2018
image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
image from The Road To Compliance:Steps For Securing Data To Comply With The GDPR

The Road To Compliance:Steps For Securing Data To Comply With The GDPR

Here is another helpful eBook to provide insight into the GDPR compliance situation.

Added: October 17, 2018
image from Threat Advisory: SkyDemon Mobile Apps & Website

Threat Advisory: SkyDemon Mobile Apps & Website

This is a threat advisory for SkyDemon Mobile Apps & Website.

Added: October 17, 2018
image from 2016 Shadow Data Report

2016 Shadow Data Report

The Shadow Data Report published by Elastica CloudThreat Labs, addresses key trends and challenges facedby enterprises securing data stored and shared via cloudapps and services.

(more available)
Added: October 16, 2018
image from 2016 State Of Privacy & Security Awareness

2016 State Of Privacy & Security Awareness

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 16, 2018
image from Cyber Risk: Threat and Opportunity

Cyber Risk: Threat and Opportunity

The executive summary of this paper gives four points of discussion: a) Interest in cyber insurance has grown beyond expectations b) Cyber attacks and breaches have grown in frequency, and loss costs are on the rise c) Insurers are issuing an increasing number of cyber insurance policies and becoming more skilled and experienced at underwriting and pricing this rapidly evolving risk d) Some observers believe that cyber exposure is greater than the insurance industry’s ability to adequately underwrite the risk.

(more available)
Added: October 16, 2018
image from Cybercrime And Other Threats Faced By The Healthcare Industry

Cybercrime And Other Threats Faced By The Healthcare Industry

In this paper they discuss several aspects of the healthcare threat surface.

Added: October 16, 2018
image from Digging Deeper: An In Depth Analysis Of A Fast Flux Network

Digging Deeper: An In Depth Analysis Of A Fast Flux Network

This whitepaper provides some insight into a Fast Flux Network and its ability to deal with attacks.

Added: October 16, 2018
image from Estimating The Global Cost Of Cyber Risk: Methodology And Examples

Estimating The Global Cost Of Cyber Risk: Methodology And Examples

The goal of this research was to produce a transparent methodology for estimating present and future global costs of cyber risk, acknowledging the considerable uncertainty in the frequencies and costs of cyber incidents.

(more available)
Added: October 16, 2018
image from Evaluation Guide For Mobile App Security Testing

Evaluation Guide For Mobile App Security Testing

This book provides some good guidance for app security testing. It seeks to assist enterprises with solving the issues surrounding app security.

(more available)
Added: October 16, 2018
image from GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 14, 2025 12:09 UTC (build 0d9043b)