Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Policy violation

Below you will find reports with the tag of “Policy violation”

image from Detecting and Stopping Famous Insider Attacks through Behavioral Analytics

Detecting and Stopping Famous Insider Attacks through Behavioral Analytics

This paper is a theoretical study looking at three famous cases of insider attacks that occurred over the past six years. (more available)
Added: February 5, 2019
image from Global Cloud Data Security Report Q1 2015

Global Cloud Data Security Report Q1 2015

From the report, “CipherCloud enables organizations to embrace cloud applications by protecting critical data going into the cloud. This approach has been adopted by millions of users in multiple industries, such as healthcare, banking and finance, telecommunications and government, across the globe. (more available)
Added: October 23, 2018
image from Untangling CIPA

Untangling CIPA

This paper takes a look at the Children’s Internet Protection Act.
Added: October 19, 2018
image from Understanding And Selecting A Data Loss Prevention Solution

Understanding And Selecting A Data Loss Prevention Solution

This Paper provides the background on DLP, to help you understand the technology, know what to look for in a product or service, and make the best decision for your organization. (more available)
Added: October 18, 2018
image from Top 7 Office 365 Security Use Cases For a CASB 2016

Top 7 Office 365 Security Use Cases For a CASB 2016

This eBook discusses revelant cloud security information for those using Microsoft Office 365
Added: October 13, 2018
image from Winter 2018 Netskope Cloud Report

Winter 2018 Netskope Cloud Report

This quarterly report from Netskope details information gleaned from providing cloud security to their clients.
Added: October 12, 2018
© Cyentia Institute 2022
Library updated: June 30, 2022 20:09 UTC (build d6199b1)