Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Personal Data

Below you will find reports with the tag of “Personal Data”

image from M-Trends 2016

M-Trends 2016

In this issue, Mandiant presents their popular annual breach statistics, discuss three new trends that they have noticed, explore more in depth “Trends Turned Constants”, and include two additional articles to help support their interpretation of the numbers they present. The articles address the [re]Rise of Red Teaming operations, and how their FireEye as a Service (FaaS) service line is keeping companies safer and reducing the standard number of days compromised.

(more available)
Added: October 13, 2018
image from Machine Learning: Fraud Is Now A Competitive Issue

Machine Learning: Fraud Is Now A Competitive Issue

This paper takes a unique look at the competing issues of using machine learning techniques to fight fraud at financial institutions.

(more available)
Added: October 13, 2018
image from New Rules:The Evolving Threat Landscape in 2016

New Rules:The Evolving Threat Landscape in 2016

These predictions will provide an historical overview of the evolving threat landscape, reveal the new trends and strategies that Fortinet researchers anticipate cyber criminals will employ in the year to come, and demonstrate how Fortinet is proactively positioned to change the way businesses look at their security strategy going into the new year.

(more available)
Added: October 13, 2018
image from The Cost of Cyber Crime

The Cost of Cyber Crime

This research develops a causal model, relating different cyber crime types to their impact on the UK economy. The model provides a simple framework to assess each type of cyber crime for its various impacts on citizens, businesses and the Government.

(more available)
Added: October 13, 2018
image from The EU General Data Protection Regulation

The EU General Data Protection Regulation

This whitepaper discusses what the General Data Protection Regulation (GDPR) will mean to organizations globally.

Added: October 13, 2018
image from Threat Advisory: CBS mobile apps & website

Threat Advisory: CBS mobile apps & website

This is a threat advisory for CBS mobile apps & website

Added: October 13, 2018
image from Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

The ever-changing cyber threat environment is forcing IT decision-makers (ITDMs) to re- evaluate their security strategies. How well equipped are SMBs to protect their data? How are they adapting their approaches to keep pace with a barrage of new cyber threats? To find out, Webroot commissioned a study of ITDMs in the US, UK, and Australia to evaluate the current security concerns and strategies of SMBs around the world. This report discusses the results of that survey.

(more available)
Added: October 13, 2018
image from Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Will Connected Cars Crash Into The Cloud Or Accelerate Into The Fast Lane?

Connected cars are facing four fundamnetal challenges that need to be overcome. See what these automotive Ethernet industry challenges are and the solutions that are available to help overcome several of the challenges.

(more available)
Added: October 13, 2018
image from 2015 Data Breach Reports

2015 Data Breach Reports

This report is an overwhelmingly large list and description of security breaches. It details type of industry impacted, type of attack, and types of information compromised.

(more available)
Added: October 12, 2018
image from 2016 Norton Cyber Security Insights Report

2016 Norton Cyber Security Insights Report

This report finds that victims of cybercrime within the past year often continued their unsafe behavior. This report details and discusses this issue.

(more available)
Added: October 12, 2018
image from 2017 Cyber Survey Report 2017

2017 Cyber Survey Report 2017

This survey report discusses the point that no company is completely safe from a catastrophic cyberattack. It tries to help ask the questions, “How concerned is your company?” and “What are you doing to prepare?”

(more available)
Added: October 12, 2018
image from 2017 Security Predictions

2017 Security Predictions

This report seeks to prove that the world emerging in 2017 will challenge cybersecurity professionals like never before.

Added: October 12, 2018
image from A Priviliged Account Security Approach To GDPR Readiness

A Priviliged Account Security Approach To GDPR Readiness

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 12, 2018
image from Cloud Security Trends: May 2017

Cloud Security Trends: May 2017

This is a report on cloud security trends.

Added: October 12, 2018
image from Cyber Extortion Risk Report

Cyber Extortion Risk Report

This report looks at the costs, and the growth, of cybercrimes, based on data from five countries. It also examines the types and numbers of cyber crimes and their impacts. It also offers predictions for the future of cyber crimes.

(more available)
Added: October 12, 2018
image from Don't Take The Bait

Don't Take The Bait

In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defense against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.

(more available)
Added: October 12, 2018
image from Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

This Case Study looks at an example of how the app Pokemon Go, caused the compromise of sensitive corporate data.

(more available)
Added: October 12, 2018
image from GDPR Cheat Sheet For Cybersecurity Professionals

GDPR Cheat Sheet For Cybersecurity Professionals

This paper provides a simple approach to understanding and implementing GDPR compliance.

Added: October 12, 2018
image from GDPR Friend Or Foe

GDPR Friend Or Foe

This white paper the explore the GDPR. The consequences of non-compliance, and how an organization can use the GDPR to re-examine and upgrade their security posture.

(more available)
Added: October 12, 2018
image from GDPR Headlines

GDPR Headlines

Centrify has worked with the specialist law firm, Cordery, to develop this headline summary of when the GDPR applies, the key impacts and what you need to do to comply with the GDPR.

(more available)
Added: October 12, 2018
image from GDPR White Paper

GDPR White Paper

This paper takes a good and definitive look at the GDPR.

Added: October 12, 2018
  • ««
  • «
  • 16
  • 17
  • 18
  • 19
  • 20
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 14, 2025 12:09 UTC (build 0d9043b)