Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privacy

Below you will find reports with the tag of “Privacy”

image from A Survival Guide To Using GPL

A Survival Guide To Using GPL

This white paper discusses the principals of the GNU Public License (GPL), the risks of using GPL-licensed code, and how GPL code may be used in proprietary products while minimizing legal compliance issues.

(more available)
Added: October 26, 2018
image from Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information

This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events. The report should provide valuable information that can be used by businesses and policymakers as they develop policies and best prac-tices related to information security and data breach response. More- over, it should be of interest to individuals who conduct business with any organization that holds their personal and confidential data.

(more available)
Added: October 26, 2018
image from Cyber Update: 2015 Cyber Insurance Profits and Performance

Cyber Update: 2015 Cyber Insurance Profits and Performance

A total of 117 US insurers were found to have underwritten cyber insurance in 2015. This paper has analyzed these filings and has outlined them to provide insights for insurers that either currently offer or seek to offer cyber insurance to help them benchmark and drive decisions on underwriting and reinsurance purchase.

(more available)
Added: October 26, 2018
image from Data Privacy: How Boards Can Safeguard Digital Assets Today For Success Tomorrow

Data Privacy: How Boards Can Safeguard Digital Assets Today For Success Tomorrow

In this Cyber Security series, Amrop collaborates with some of the industry’s most innovative companies as they trailblaze through the digital landscape. This first insight piece is co-authored with Jason du Preez, CEO of Privitar, a leader in the development and adoption of privacy engineering technology.

(more available)
Added: October 26, 2018
image from Functional Model Representation of the Identity Ecosystem

Functional Model Representation of the Identity Ecosystem

The Identity Ecosystem Functional Model deliverable was developed by the IDESG Security Committee to provide context to discussions of identity ecosystems and a consistent model upon which to center descriptions of identity solutions. This is not a model of the IDESG as an organization but a representation of online identity interactions and the various components needed to execute those interactions.

(more available)
Added: October 26, 2018
image from Securing Smart Cities:Moving Toward Utopia With Security In Mind

Securing Smart Cities:Moving Toward Utopia With Security In Mind

This paper surveys some of the existing smart technologies currently used in smart cities worldwide. Much like our previous reports on exposed smart devices and the hacking of robots in smart factories, this paper will discuss the risks of using smart technologies in critical sectors and will provide actionable steps to help local governments and urban developers design more secure smart cities.

(more available)
Added: October 26, 2018
image from The 2018 Global Cloud Data Security Study

The 2018 Global Cloud Data Security Study

This year’s study reveals the increasing risk of noncompliance with new global privacy and data protection regulations. Another important trend over the past three years is IT security’s continuing loss of control over cloud security practices and budget.

(more available)
Added: October 26, 2018
image from The Key Things Your Whole Business Needs To Know To Be GDPR Ready

The Key Things Your Whole Business Needs To Know To Be GDPR Ready

This paper asks 5 key questions that should help your organization know what to do with their data and GDPR compliance.

(more available)
Added: October 26, 2018
image from Turnaround And Transformation In Cybersecurity 2015

Turnaround And Transformation In Cybersecurity 2015

This paper is based on the findings of a worldwide study.

Added: October 26, 2018
image from 2018 Global Study On Application Security

2018 Global Study On Application Security

Ponemon Institute is pleased to present the findings of the 2018 Global Study on The State Application Security sponsored by Arxan Technologies. We surveyed 1,399 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses when running in unsecured environments and how they are addressing this risk in practice.

(more available)
Added: October 25, 2018
image from Cloud Security Spotlight 2018

Cloud Security Spotlight 2018

Here is a report based on collaboration from a variety of cybersecurity insiders.

Added: October 25, 2018
image from DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

DeepGaurd: Proactive On-host Protection Against New And Emerging Threats

This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention System (HIPS) of F-Secure’s security products.

(more available)
Added: October 25, 2018
image from Healthcare Breach Report 2016: What a Difference a Year Makes

Healthcare Breach Report 2016: What a Difference a Year Makes

This report, answers the questions, “why are hackers now targeting healthcare data?” and, “how did they conduct large scale attacks that affected millions?” It also details how healthcare organizations can use a Cloud Access Security Broker to protect data in the cloud, enable secure BYOD and remain HIPAA compliant.

(more available)
Added: October 25, 2018
image from IBM Pathways For GDPR Readiness

IBM Pathways For GDPR Readiness

This white paper contains IBM’s suggestions for accelerating the process of becoming compliant with Europe’s GDPR.

Added: October 25, 2018
image from Preparing For The EU General Data Protection Regulation

Preparing For The EU General Data Protection Regulation

This white paper prepares you for GDPR by providing a basic understanding of what is involved with the different sections of the regulations, and how technology can be used to drive the initial discovery which can be used to drive the plan as well as the ongoing process of maintaining compliance.

(more available)
Added: October 25, 2018
image from SANS Survey on Security Optimization

SANS Survey on Security Optimization

This report discusses the proper workflows in Security Optimization.

Added: October 25, 2018
image from Secure The App Not The Device

Secure The App Not The Device

This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.”

Added: October 25, 2018
image from The Betterly Report Cyber Privacy Insurance Market Survey

The Betterly Report Cyber Privacy Insurance Market Survey

An annual review and evaluation of insurance products designed to protect against the unique risks of data security for organizations.

(more available)
Added: October 25, 2018
image from Threat Advisory: Bluclub

Threat Advisory: Bluclub

This is a threat advisory for Bluclub.

Added: October 25, 2018
image from Uber: Security Risks Come Along With Your Ride

Uber: Security Risks Come Along With Your Ride

Appthority analyzed the security risks of the Uber app and its integration with other apps in this quarter’s enterprise mobile threat update. What they found may surprise you.

(more available)
Added: October 25, 2018
image from 2017 Breach Briefing

2017 Breach Briefing

BBR Services is on the front-lines of breach management and has attained a wealth of cyber expertise and knowledge of emerging trends. From this vantage point we have compiled the 2017 Beazley Breach Briefing, which is based on our 2016 data and provides our unique insight into key trends in data breach causes including factors that impact costs of data breaches.

(more available)
Added: October 24, 2018
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 20:08 UTC (build b1d7be4)