Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Personal Data

Below you will find reports with the tag of “Personal Data”

image from Consumer Attitudes Toward Data Privacy Survey, 2018

Consumer Attitudes Toward Data Privacy Survey, 2018

This report by Akamai, sought to find out how much consumers trust companies. The study found that American consumers are very forgiving with companies that have access to their personal information.

(more available)
Added: June 29, 2020
image from BlackHat USA Attendee Survey: Cyber Threats in Turbulent Times

BlackHat USA Attendee Survey: Cyber Threats in Turbulent Times

A survey of 273 security professionals on the implications of the COVID-19 pandemic on security perceptions.

Added: June 24, 2020
image from Privacy in the Wake of COVID-19

Privacy in the Wake of COVID-19

A survey of 933 respondants on changes to privacy and data protection after COVID-19 and how companies are keeping their data protected.

(more available)
Added: June 22, 2020
image from 2020 Global Threat intelligence Report

2020 Global Threat intelligence Report

A report derived from NTT’s managed SOC service, seeking to identify modern and emerging trends observed across industries and regions.

(more available)
Added: June 21, 2020
image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners.

(more available)
Added: June 13, 2020
image from 2019 Global Security Report

2019 Global Security Report

A year in review report drawing on the events observed by AppRiver Security analysts and the telemetry from the AppRiver security platforms. Includes predictions for 2020.

(more available)
Added: June 13, 2020
image from Ripples Across the Risk Surface

Ripples Across the Risk Surface

Using breach data from Advisen, this report defines ripple effects of breaches as the impacts on companies more than one degree of separation from the company directly affected by the breach. As vendor relationships are both broad and deep, a breach in any one company in a network can have distant effects on companies not directly related. The implications upon third party risk management are explored.

(more available)
Added: June 10, 2020
image from Protecting your personal data online at every point

Protecting your personal data online at every point

To protect the data we store on our devices and upload online, we first need to understand where the key risks may lie. This report reviews some of the main stories and tactics we have seen affecting data privacy over the past 12 months and provides advice on how individuals can keep control over their personal data at every turn.

(more available)
Added: May 18, 2020
image from 2020 Data Security Incident Response Report

2020 Data Security Incident Response Report

The 2020 data breach report from the events managed by the BakerHosteltler incident response team. Trends, timelines, and losses are covered.

(more available)
Added: May 18, 2020
image from 2020 Global Identity and Fraud Report

2020 Global Identity and Fraud Report

Experian’s 2020 Global Identity & Fraud Report explores inconsistencies between businesses’ views of their ability to meet their customers’ needs, and customer experiences with those businesses. It also underscores the opportunity for companies like yours to differentiate from the competition through the ways you engage with customers, with emphasis on how you identify and recognise them each time they interact with your business. Experian appreciates that many companies find it challenging to evolve traditional business models in order to meet the expectations of ‘always-on’ customers. But we also believe that customers’ identity verification and ongoing recognition (re-recognition) can be driving forces for greatly improved and more profitable customer relationships.

(more available)
Added: May 8, 2020
image from The State of Enterprise IT in 2020

The State of Enterprise IT in 2020

The following report provides insights about what did and did not change in status and viewpoints between 2019 and 2020 and why.

(more available)
Added: May 8, 2020
image from CISO Media Consumption

CISO Media Consumption

In this, our launch issue of CyberTheory, we will explore the current and future state of cybersecurity, the key issues driving the shift in the corporate board room perception of cyber-risk and add substantive analysis to what we believe are the most engaging topics in the space.

(more available)
Added: March 1, 2020
image from 2017 The Year of Internal Threats and Accidental Data Breaches

2017 The Year of Internal Threats and Accidental Data Breaches

Gemalto outlines changes to threats in 2017, including data from incidents in the year.

Added: February 18, 2020
image from 2017 Survey Results Cybersecurity: Can Overconfidence Lead to an Extinction Event?

2017 Survey Results Cybersecurity: Can Overconfidence Lead to an Extinction Event?

In early 2017, SolarWinds MSP investigated the cybersecurity preparedness, experiences, and failings of 400 SMBs and enterprises, split equally across the UK and the US. While 87% of organizations have complete trust in their security techniques and technology—and 59% believe they are less vulnerable than they were 12 months previously—71% of those same organizations have been breached in the past 12 months. The belief that “it will never happen to us” simply doesn’t hold true.

(more available)
Added: February 18, 2020
image from Cisco Data Privacy Benchmark Study 2020

Cisco Data Privacy Benchmark Study 2020

Using survey data from 2,500 security professionals who indicated they have some measure of privacy responsibilities, this report provides analysis on the ROI for privacy efforts, maturity of privacy programs, vendor selection, and other topics.

(more available)
Added: February 17, 2020
image from Exploring Coordinated Disclosure: Shedding Light on Perceptions and Experience in How Software Vulnerabilities are Reported

Exploring Coordinated Disclosure: Shedding Light on Perceptions and Experience in How Software Vulnerabilities are Reported

Veracode commissioned this survey from 451 Research to understand how widely accepted andpracticed coordinated disclosure – whereby a security researcher identifies a flaw and notifiesthe company, then the two work together to fix and publicly disclose the flaw – really is andwhere the pain points reside. In addition, we wanted to explore the means organizations haveestablished to receive vulnerability reports, and the attitudes toward a coordinated disclosurepolicy on both sides of the organization and among external security researchers. We also soughta deeper understanding of the motivations of security researchers, actions when a vulnerabilityis identified, timing for disclosure, desired outcomes, how organizations structure disclosurepolicies, and the effectiveness of bug bounties.

(more available)
Added: February 12, 2020
image from Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

This report from Pew Research Center goes over how and where the average person’s personal information is used online. It goes over the lack of control most people feel, who collects your data, the lack of understanding people have over who uses their data, and how people think about the privacy and vulnerability of their personal data.

(more available)
Added: February 12, 2020
image from Consumer Privacy Survey

Consumer Privacy Survey

This is a survey conducted by Cisco, mainly talking about their findings that people care about privacy, and a surprisingly large number have already taken actions to protect it.

(more available)
Added: February 9, 2020
image from Data Breach Litigatio Report

Data Breach Litigatio Report

Bryan Cave Leighton Paisner began its survey of data breach class action litigation six years ago to rectify the information gap and to provide our clients, as well as the broaderlegal, forensic, insurance, and security communities,with reliable and accurate information concerning the risk associated with data breach litigation. Our annual survey continues to be the leading authority on data breach class action litigation and is widely cited throughout the data security community.

(more available)
Added: October 1, 2019
image from State of Cybersecurity Report 2019

State of Cybersecurity Report 2019

From the report, “[This] report also captures the changing strategies used by attackers and highlights how organizations today are bolstering their defenses to stay one step ahead. It concludes with a peek into the cybersecurity areas that will be pertinent in the near future. We hope that you will benefit from the global and industry-specific insights available in this edition of the State of Cybersecurity Report and that together, we will be able to make our enterprises more resilient to withstand and recover from future attacks!”

(more available)
Added: September 18, 2019
image from State of the Internet: Media Under Assault

State of the Internet: Media Under Assault

From the report, “From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. In this special edition of the State of the Internet / Security Report, we’re focusing on data within the high tech, video media, and entertainment sectors — collectively named Media & Technology.”

(more available)
Added: September 18, 2019
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 04:08 UTC (build b1d7be4)