Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Personal Data

Below you will find reports with the tag of “Personal Data”

image from Internet Crime Report 2016

Internet Crime Report 2016

The 2016 Internet _x0012_Crime Report highlights the I_x0012_3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), ransomware, tech support fraud, and extortion. In 2016, IC3 received a total of 298,728 complaints with reported losses in excess of $1.3 billion.

(more available)
Added: October 16, 2018
image from Sleeper Awake: RSA Conference Transcript 2016

Sleeper Awake: RSA Conference Transcript 2016

This is the transcript from Amit Yoran’s presentation at the 2016 RSA Conference.

Added: October 16, 2018
image from The Executive Cyber Security Playbook

The Executive Cyber Security Playbook

In this ebook, FireEye explains why senior executives must be more proactive about cyber security — before, during and after an event — and how they can help create and maintain a strong security posture.

(more available)
Added: October 16, 2018
image from Threat Advisory: Lycos Mail

Threat Advisory: Lycos Mail

This ia a threat advisory for Lycos Mail

Added: October 16, 2018
image from 2018 GDPR Compliance Report

2018 GDPR Compliance Report

This research uncovers the perspectives of organizations on the impact of the new regulation, how prepared they are, and how they plan to be in compliance with the new law to avoid significant penalties.

(more available)
Added: October 15, 2018
image from Automation: The Future Of Network Visibility

Automation: The Future Of Network Visibility

This whitepaper provides some insights to consider for automating your SIEM, NMS, packet capture device, and other tool deployments.

Added: October 15, 2018
image from Cloud Best Practices:Audit Checklist For Endpoint Security

Cloud Best Practices:Audit Checklist For Endpoint Security

This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.

(more available)
Added: October 15, 2018
image from Consumer Security Risks Survey 2016

Consumer Security Risks Survey 2016

This report discusses four main findings; 1) Consumers are concerned about online threats to the people and things that matter most, 2) The dangers online can have severe consequences for people’s data, 3) Children are also exposed to online threats, 4) People should be more cyber savvy - and protect what matters most - when they are online.

(more available)
Added: October 15, 2018
image from Data Protection Under POPI

Data Protection Under POPI

This white paper provides insight into becoming complaint with South Africa’s Protection of Personal Information Bill. (POPI)

Added: October 15, 2018
image from Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

This project comprised two main research and development phases. The first phase of the project entailed a requirements analysis and architecture-design effort. For further details on this phase, please refer to the first study report. The second phase of the project entailed the development of a proof-of-concept toolbox. This report presents the proof-of-concept toolbox.

(more available)
Added: October 15, 2018
image from Email Fraud Threat Report Year In Review

Email Fraud Threat Report Year In Review

The details in this report are compiled from Proofpoint’s specific research and experience from the events of 2017.

Added: October 15, 2018
image from Federal Information Security Modernization Act Report to Congress

Federal Information Security Modernization Act Report to Congress

The President of the United States’ Office of Management and Budget, prepared this report. This report covers the period from October 1, 2014, through September 30, 2015, and provides an update of ongoing information security initiatives, a review of Fiscal Year 2015 information security incidents, Inspector General assessments of agencies’ progress in implementing information security capabilities, and the Federal Government’s progress in meeting key information security performance measures based on agency submitted data.

(more available)
Added: October 15, 2018
image from GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 15, 2018
image from General Data Protection Regulation: The Mobile Implications

General Data Protection Regulation: The Mobile Implications

This paper is designed to help businesses manage their mobile data risks in relation to GDPR, which will affect almost every global organisation.

(more available)
Added: October 15, 2018
image from State Of Privacy & Security Awareness In Retail

State Of Privacy & Security Awareness In Retail

This report provides data to help understand the need of helping employees understand PCI compliance in the retail industry.

Added: October 15, 2018
image from The Danger Within: Unmasking Insider Threats

The Danger Within: Unmasking Insider Threats

This eBook outlines the who, what, why and how of the insider threat to expose risks you may not be considering, and provides guidance to help you prevent and detect these costly attacks.

(more available)
Added: October 15, 2018
image from The GDPR:Key Themes And Challenges

The GDPR:Key Themes And Challenges

This helpful report provides analysis of the GDPR, some misconceptions, and some helpful tips for becoming compliant.

Added: October 15, 2018
image from The Global State Of Online Digital Trust

The Global State Of Online Digital Trust

The digital trust perception gap, and other findings in this ground-breaking study, highlight the need for business leaders to understand how much consumers trust organizations, what drives digital trust, and the business impact of losing that trust.

(more available)
Added: October 15, 2018
image from Threat Advisory: iCare Leak

Threat Advisory: iCare Leak

This is a threat advisory for iCare Leak

Added: October 15, 2018
image from Why K-12 Cybersecurity Involves More Than Just CIPA Compliance

Why K-12 Cybersecurity Involves More Than Just CIPA Compliance

Cybersecurity is one of many considerations teachers now juggle as they seek to get the most out of digital transformation in the classroom. But when the weight of assuring cybersecurity conflicts with the litany of everyday issues that teachers are faced with on campus, enforcing digital best practices often falls by the wayside.

(more available)
Added: October 15, 2018
image from 2016 State Of Privacy & Security Awareness: The Story Behind The Story

2016 State Of Privacy & Security Awareness: The Story Behind The Story

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 14, 2018
  • ««
  • «
  • 15
  • 16
  • 17
  • 18
  • 19
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 14, 2025 12:09 UTC (build 0d9043b)