Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Personal Data

Below you will find reports with the tag of “Personal Data”

image from 2018 Airlines Phishing Report

2018 Airlines Phishing Report

Phishing domains pose a significant cyber risk for major airlines. Learn how many phishing domains for major airlines there are and how to find them.

(more available)
Added: March 6, 2019
image from State of the Internet/Security Retail Attacks and API Traffic

State of the Internet/Security Retail Attacks and API Traffic

From the report, “All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked.”

(more available)
Added: March 1, 2019
image from Breach & Attack Simulation: Recapping The Largest Cyber Trends of 2018 & Predictions For 2019

Breach & Attack Simulation: Recapping The Largest Cyber Trends of 2018 & Predictions For 2019

This report analyzes many of the cyber security situations from 2018 and offers some predictions for 2019.

Added: February 18, 2019
image from State Of Executive Cybersecurity Awareness

State Of Executive Cybersecurity Awareness

From the report, “Let’s face it: senior leaders at organizations across the globe are already pressed for their time and attention. Today’s changing threat landscape requires executives and managers to fundamentally rethink their approach when it comes to addressing and mitigating cyber-risk. With the growth in cloud, mobile, and IoT, combined with employee and supply chain access to critical data and intellectual property, security and privacy awareness is now front and center for executives in the fight against cyberthreats. Yet finding the time for executives to effectively educate themselves in order to prevent cyberthreats continues to be a challenge. Take a look [in the report and discover] how executives and managers across various industries compared to the general population in terms of their knowledge of cybersecurity and data privacy best practices.”

(more available)
Added: February 18, 2019
image from An Executive Summary On The State Of Privacy And Security Awareness In Government

An Executive Summary On The State Of Privacy And Security Awareness In Government

To better understand what government employees know (and don’t know) about data privacy and cybersecurity awareness, we surveyed 1,016 U.S.- based employees who work for local, state, and federal government entities. We then compared the results against a broader sample of employed U.S. adults that took the same survey, the results of which we featured in our 2017 State of Privacy and Security Awareness report.

(more available)
Added: February 18, 2019
image from Are The New European Cybersecurity Regulations Working?

Are The New European Cybersecurity Regulations Working?

This infographic offers insights relating to the European Cybersecurity regulations.

Added: February 17, 2019
image from A Trident of Change in Europe: Understanding DSM, PSD2 & GDPR

A Trident of Change in Europe: Understanding DSM, PSD2 & GDPR

From the report, “The Digital Single Market, Revised Payment Services Directive and the General Data Protection Regulation are all complex and occasionally bewildering pieces of legislation, which aim to transform the European online market and improve services by promoting innovation. However, as they are yet to be fully implemented, organisations are understandably concerned about what they will look like in practice as opposed to on paper. Will global merchants from outside the region still be able to compete in Europe or will the new regulations be used as a form of protectionism? Will they fight fraud and chargebacks or unwittingly contribute to them? And how will Brexit – the unstable factor in the immediate future of the EU – impact all of this? As merchants and others wait in anticipation for the final stages of these three policy initiatives to take shape, The Chargeback Company is joined by contributors from ACI Worldwide and Kount to analyse the likely implications and opportunities for doing business in Europe from 2018.”

(more available)
Added: February 16, 2019
image from Open Banking & APIs Report 2017

Open Banking & APIs Report 2017

The Open Banking & API Report 2017 gives insight into the nascent landscape of Open Banking in Europe. Divided into two parts, it aims to give you both the basis of knowledge necessary to understand the latest developments on the topic, as well as practical examples and best practices in Open Banking. First, the report elaborates on the innovations in Open Banking and the issues that still stand in the way of universal adoption. Afterwards, we will dive into the best practices and new business models in both banking and fintech.

(more available)
Added: February 13, 2019
image from Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

From the report, “The widespread digitization of financial services is causing large-scale and sweeping transformations across various facets of the business, creating new growth opportunities but also new challenges and inherent risk. In the insurance sector, particularly, digital transformation is driven by new competitive threats, ongoing cost pressures, aging technology and increasing regulatory requirements. Put all together, there is a huge opportunity to modernize, to create new business models, acquire customers on new channels and create competitive and compelling customer experiences. ” Read on to find out more.

(more available)
Added: February 13, 2019
image from Fraud Attack Index Fifth Edition

Fraud Attack Index Fifth Edition

From the report, “As such, Forter creates a biannual Fraud Attack Index to highlight these changes as they affect e-commerce and mobile merchants and to provide anti-fraud professionals with the context they need to succeed. This report leverages Forter’s data to examine the trends in online fraud attacks across industries, comparing the different fraud experienced by different verticals. The report also looks at the prevalence of specific fraud methods or directions of attack (e.g. location manipulation, botnets, etc.). This is to provide insights into the various techniques commonly employed by today’s cunning fraudsters.” Read on to find out more.

(more available)
Added: February 13, 2019
image from The Role Of Applicant Behavior In Identity Proofing

The Role Of Applicant Behavior In Identity Proofing

As account opening continues to transition from physical to digital channels, financial institutions, issuers, lenders, and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise as criminals have become more successful than ever, thanks to some of the same digital channel benefits enjoyed by consumers: convenience, speed, and ease of use. To achieve the necessary balance between preventing fraud and providing a delightful experience for consumers, an approach to identity proofing that accounts for the channel, product, customer, and threat environment is absolutely critical. But regardless of the approach, inconspicuous solutions — like those based on applicant behavior — have a distinct role to play in how institutions manage the risk of application fraud.

(more available)
Added: February 13, 2019
image from Addressing Analyst Fatigue In The SOC

Addressing Analyst Fatigue In The SOC

This whitepaper is intended to help firms identify the symptoms of SOC Analyst fatigue, recognize the underlying causes and evaluate recommendations for addressing the problem.

(more available)
Added: February 12, 2019
image from Cisco 2018 Privacy Maturity Benchmark Study

Cisco 2018 Privacy Maturity Benchmark Study

The Cisco 2018 Privacy Maturity Benchmark Study was created in conjunction with Cisco’s Annual Cybersecurity Benchmark Study, a double-blind survey completed by more than 3600 security professional in 25 countries and across all major industries. The privacy specific questions focused on a subset of nearly 3000 respondents who were familiar with the privacy processes at their organizations. Participants were asked about the makeup of their privacy teams, maturity level of their privacy processes, and the impact (if any) they experienced related to delays in the sales cycle due to customer data privacy concerns. We also analyzed responses to other questions regarding cyber events to understand which organizations had been breached in the last year and the size of any losses from these events.

(more available)
Added: February 12, 2019
image from IBM Cybersecurity and Privacy Research

IBM Cybersecurity and Privacy Research

Some key headlines from this report include; A majority of the public is more concerned about cyber security that it was five years ago, A majority are confident that companies can protect their data and help in the wake of a breach, Most feel business’ focus on profits could negatively impact cybersecurity commitment. Read on for further insight.

(more available)
Added: February 12, 2019
image from The Cyber Resilience of Canadian Organizations

The Cyber Resilience of Canadian Organizations

Scalar’s study of the cyber resilience of Canadian organizations finds there is a new normal across the threat landscape. Cyber security incidents – whether they be exfiltration, infiltration, or denial of service – are now occurring on a regular basis. To address this, the focus of cyber security efforts is shifting from an emphasis on protection against attacks, to improving the detection of malicious actors on the network, and responding to and recovering from incidents as quickly as possible. The findings of the 2019 Scalar Security Study reflect on these new trends and introduce cyber resilience as a security theme that emphasizes the importance of business continuity and the need for organizations to return to normal operations and a trusted state after an incident has occurred

(more available)
Added: February 9, 2019
image from Changing Data Breach Notification Laws: Regulatory Trends

Changing Data Breach Notification Laws: Regulatory Trends

From the report, “Analyzing this flurry of legislative activity in 2018, we have identified a number of continuing trends. In general, the overarching trend is increasing stringency and growing complexity in breach notification obligations. In the following pages, we’ll break down this overarching trend into separate and distinct trends. We’ll also look at what these trends mean for how privacy and security professionals work today.”

(more available)
Added: February 9, 2019
image from Social Media Privacy: Settings User Guide

Social Media Privacy: Settings User Guide

This helpful guide provides insight into the settings you should maintain on all of the major social networks. Read on to learn more.

(more available)
Added: February 7, 2019
image from Social Engineering In The Social Media Age: Top Fraudulent Account and Impersonator Tactics

Social Engineering In The Social Media Age: Top Fraudulent Account and Impersonator Tactics

Fraudulent accounts run rampant on social media. But what are they up to, what cyber attacks are they launching? ZeroFOX Research investigates 40,000 fake accounts to find out.

(more available)
Added: February 7, 2019
image from Brand Protection For Modern Enterprsies

Brand Protection For Modern Enterprsies

This report offers insights into brand protection in the modern age of social media threats. It offers insights into brand protection, why you need to protect your brand, risks to a brand, the benefits of brand protection, the current state of brand protection and how to build a brand protection program.

(more available)
Added: February 7, 2019
image from External Social And Digital Threats To Financial Institutions

External Social And Digital Threats To Financial Institutions

Social media has become a major platform for financial institutions to engage customers, grow their business, and promote offers and services. However, scammers and cybercriminals have adopted the platform as well, exploiting the low technical barriers, ease of target acquisition, ease of payload delivery, and broad access to potential victims.

(more available)
Added: February 7, 2019
image from Cisco Cybersecurity Series January 2019: Maximizing the value of your data privacy investments

Cisco Cybersecurity Series January 2019: Maximizing the value of your data privacy investments

The findings from this study provide strong evidence that organizations are benefitting from their privacy investments beyond compliance. Organizations that are ready for GDPR are experiencing shorter delays in their sales cycle related to customers’ data privacy concerns than those that are not ready for GDPR. GDPR-ready organizations have also experienced fewer data breaches, and when breaches have occurred, fewer records were impacted, and system downtime was shorter. As a result, the total cost of data breaches was less than what organizations not ready for GDPR experienced.

(more available)
Added: February 6, 2019
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 14, 2025 12:09 UTC (build 0d9043b)