Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privacy

Below you will find reports with the tag of “Privacy”

image from Consumer Trust, Consent and Knowledge in the Age of Digital Identity

Consumer Trust, Consent and Knowledge in the Age of Digital Identity

From the report, “The survey results show that companies should ensure their online interactions with customers are aligned around three key principles: trust, consent, and education.” Read on to understand more.

(more available)
Added: November 24, 2018
image from Under Siege: Achieving Cyber-Resiliency In An Evolving Healthcare Landscape

Under Siege: Achieving Cyber-Resiliency In An Evolving Healthcare Landscape

This report provides insight into the state of cybersecurity in Healthcare.

Added: November 24, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study: 2018

LexisNexis Risk Solutions Fraud Mitigation Study: 2018

Since 2015, LexisNexis Risk Solutions has administered an annual study to determine the extent to which fraud cases span multiple industries. The national online survey included 800 fraud mitigation professionals from five industry segments and government with oversight or direct involvement in fraud programs at their organizations. It has a margin of error of +/- three points (at the 95% confidence level), and LexisNexis was not identified as the research sponsor.

(more available)
Added: November 23, 2018
image from LexisNexis Risk Solutions Fraud Mitigation Study:2017

LexisNexis Risk Solutions Fraud Mitigation Study:2017

From the report, “Fraud from stolen identities or cyber attacks/hacking were the types of fraud most concerning to fraud mitigation professionals.” Read on to discover more.

(more available)
Added: November 23, 2018
image from The Journey To Digital Trust

The Journey To Digital Trust

For 20 years, leaders have turned to PwC’s Global State of Information Security® Survey (GSISS) as a trusted resource to navigate the cyber risk landscape. Over time, that landscape has evolved to be less about “information security” and more about managing digital risk. As cybersecurity, privacy and data ethics become increasingly intertwined, organizations need a central place to turn for authoritative data and actionable advice. That is why we are rebooting GSISS to create Digital Trust Insights. This new platform will explore how to build confidence in the readiness of people, processes and technologies to meet tomorrow’s challenges.

(more available)
Added: November 21, 2018
image from CipherCloud Cloud Data Security Research

CipherCloud Cloud Data Security Research

In August 2018 CipherCloud completed a survey of key customers and cloud users that included responses from hundreds of enterprise corporations. This survey was designed to identify the key business drivers that were compelling to these users as justification for the protection of cloud data.

(more available)
Added: November 21, 2018
image from Build Pervasive Cyber Resilience Now

Build Pervasive Cyber Resilience Now

This report posits that “Companies are racing into the digital future adopting technology enabled operating and business models that drive bottom- and top- line growth. They are not prepared for the new cyber risks that come with the connected, data-driven future enterprise.” Read on to learn about solutions.

(more available)
Added: November 21, 2018
image from 2018 Unisys Security Index Australia Report

2018 Unisys Security Index Australia Report

This report provides insight into the public concern about security issues in Australia in 2018.

Added: November 21, 2018
image from State of Cybersecurity Report 2018

State of Cybersecurity Report 2018

The first edition of the “State of Cybersecurity report” was well received by customers, industry analysts and cybersecurity professionals. The 2018 edition of the Report maintains the same unique structure to build on the first edition’s ethos and bring in new viewpoints and findings. The rest of this section is reproduced from last year’s report for the benefit of first-time readers.

(more available)
Added: November 20, 2018
image from 2019 Forcepoint Cybersecurity Predictions Report

2019 Forcepoint Cybersecurity Predictions Report

In the 2019 Forcepoint Cybersecurity Predictions Report, we explore the impact of businesses putting their trust in cloud providers to protect their data, the impact of end-user trust in those securing personal biometric data, the cascading of trust into the supply chain to protect any critical data in their custodianship, and trust in algorithms and analytics successfully piloting automobiles and alerting security professionals to potential data loss incidents.

(more available)
Added: November 20, 2018
image from Email and Internet Voting: The Overlooked Threat To Election Security

Email and Internet Voting: The Overlooked Threat To Election Security

This report reviews the research that has been conducted by the federal government concluding that secure online voting is not yet feasible. We examine the insoluble security problems that are inherent to casting ballots online, including server penetration attacks, client-device malware, attacks to emailed and faxed ballots in transit, denial-of-service attacks, disruption attacks and the challenge to reliably authenticate voters.

(more available)
Added: November 20, 2018
image from The Healthy Approach To Cyber Security

The Healthy Approach To Cyber Security

This report outlines key findings from the 2017 KPMG/Forbes Insights CyberSecurity Survey of 100 senior executives from the healthcare field. [One-hundred senior life sciences executives were surveyed as well.] The findings indicate that companies are elevating cyber security to a strategic imperative but at a pace that lags behind their desire to adopt digital technologies to drive innovation. To illustrate, we take a look at the current and desired states of cyber security in healthcare through the lenses of data sharing, vendor management, and medical device implementation. We conclude with our guidance on where organizations should be focusing their efforts.

(more available)
Added: November 20, 2018
image from Accenture 2017 Internet Of Health Things Survey

Accenture 2017 Internet Of Health Things Survey

This report offers a fine summary of the Internet of Health Things, and covers the many issues related to this growing industry.

(more available)
Added: November 20, 2018
image from MM Core In-Memory Backdoor Returns as "BigBoss" and "SillyGoose"

MM Core In-Memory Backdoor Returns as "BigBoss" and "SillyGoose"

In this blog we will detail our discovery of the next two versions of MM Core, namely “BigBoss” (2.2-LNK) and “SillyGoose” (2.3-LNK). Attacks using “BigBoss” appear likely to have occurred since mid-2015, whereas “SillyGoose” appears to have been distributed since September 2016. Both versions still appear to be active.

(more available)
Added: November 15, 2018
image from China's Cyber Superpower Strategy: Implementation, Internet Freedom Implications, and U.S. Responses

China's Cyber Superpower Strategy: Implementation, Internet Freedom Implications, and U.S. Responses

This report is a transcript of written Testimony provided to the House Comittee on Oversight and Government Reform, Subcomittee on Information Technology, by Sarah Cook Senior Research analyst for East Asia and China Media Bulletin Director.

(more available)
Added: November 6, 2018
image from Top 15 Chief Information Security Officers 2018

Top 15 Chief Information Security Officers 2018

SecurityScorecard ran an analysis, looking at the security ratings of organizations over a six month period and identified which organizations improved those scores the most; whether overall or within a specific risk area.

(more available)
Added: November 4, 2018
image from Measuring the Impact of DMARC's Part In Preventing Business Email Compromise

Measuring the Impact of DMARC's Part In Preventing Business Email Compromise

Since June 2016, the Global Cyber Alliance (GCA) has been working to accelerate adoption of DMARC, an email security standard, by providing a set of easy-to-use tools and campaigns to drive deployment. This paper investigates and measures the economic benefit from that work. Having reviewed the available data, we have chosen to focus on Business Email Compromise (BEC) because it is a rapidly growing issue, with high direct losses, and relevant data is available for analysis from multiple sources. We derive a conservative minimum bar estimate for the loss avoidance tied to GCA’s initiatives and discuss the potential scale of other benefits gained from DMARC.

(more available)
Added: November 4, 2018
image from (ISC)² CYBERSECURITY WORKFORCE STUDY, 2018: Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens

(ISC)² CYBERSECURITY WORKFORCE STUDY, 2018: Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens

“For the (ISC)² Cybersecurity Workforce Study (formerly the Global Information Security Workforce Study), we talked to cybersecurity pros as well as IT pros who spend at least 25% of their time working on cybersecurity activities. This report explores the findings of that research, illuminating the cybersecurity skills gap by revealing the trends, elements, and impact, all of which can be used to inform the steps organizations and individual cybersecurity pros can take to address this troubling progression.”

(more available)
Added: November 4, 2018
image from 2018 Eye On Privacy Report

2018 Eye On Privacy Report

This paper tries to answer the question, “What does the general public know about data privacy?”

Added: October 26, 2018
image from 2018 Security Trends & Predictions

2018 Security Trends & Predictions

This report seeks to answer the question, “What will shape the next 12 months in cybersecurity?”

Added: October 26, 2018
image from A Practical Guide for GDPR Compliance

A Practical Guide for GDPR Compliance

This paper is a simple yet practical guide to understanding and becoming GDPR Compliant.

Added: October 26, 2018
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 20:08 UTC (build b1d7be4)