Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privacy

Below you will find reports with the tag of “Privacy”

image from 2018 Cost Of A Data Breach Study: Global Overview

2018 Cost Of A Data Breach Study: Global Overview

IBM Security and Ponemon Institute are pleased to release the 2018 Cost of Data Breach Study: Global Overview1. They conducted interviews with more than 2,200 IT, data protection, and compliance professionals from 477 companies that have experienced a data breach over the past 12 months. According to the findings, data breaches continue to be costlier and result in more consumer records being lost or stolen, year after year.

(more available)
Added: October 24, 2018
image from A Best Practices Guide For Comprehensive Employee Awareness Programs

A Best Practices Guide For Comprehensive Employee Awareness Programs

This guide seeks to aid organizations in creating an effective program for helping raise awareness in employees.

Added: October 24, 2018
image from CIO Survey 2018: The Transformational CIO

CIO Survey 2018: The Transformational CIO

In last year’s survey, Harvey Nash and KPMG reported how CIOs were holding a steady line in the face of global uncertainty, cutting costs and refining business processes. Whilst much of this geopolitical instability remains, this year’s report shows how CIOs are benefiting from bigger budgets and headcount growth. Indeed, more IT leaders are enjoying budget increases than we have seen in the last thirteen years of reporting.

(more available)
Added: October 24, 2018
image from How Personal Device Data Can Compromise Company Data

How Personal Device Data Can Compromise Company Data

Beginning with the Strava cyber incident, this paper seeks to provide insight into how personal device data can cause a crisis with company data.

(more available)
Added: October 24, 2018
image from IoT Security:An IBM Position Paper

IoT Security:An IBM Position Paper

This paper takes a look at how cognitive technologies will impact security in the IoT systems. It addresses a variety of issues related to CIoT and the future that lies ahead.

(more available)
Added: October 24, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of how mobile app security can be achieved through the technique of code injection.

(more available)
Added: October 24, 2018
image from Revitalizing Privacy And Trust In A Data-Driven World

Revitalizing Privacy And Trust In A Data-Driven World

From the report, “Massive data breaches and the constant collection of personal information routinely spur debate on whether privacy, rooted in ancient times, is dead in teh digiatl age. Are we in a post-privacy world? In many ways, it is the wrong question. Privacy, security and trust-all increasingly at risk-are also more vital and intertwined in our data-driven society.

(more available)
Added: October 24, 2018
image from Risk and Regulatory Outlook 2015

Risk and Regulatory Outlook 2015

In this edition of Risk and Regulatory Outlook a Deloitte subject matter expert outlines the situation, specifies existing or prescient change, and suggests practical steps in each of the nine key areas of regulatory change we focus on.

(more available)
Added: October 24, 2018
image from 2016 Cost of Data Breach Study: Global Analysis

2016 Cost of Data Breach Study: Global Analysis

This global study examines 383 companies in 12 countries. It finds that $4 million is the average total cost of a data breach. It sees a 29% increase in total costs of data breaches since 2013. It finds that $158 is the average cost per lost or stolen record. Finally, there has been a 15% increase in per capita cost since 2013.

(more available)
Added: October 23, 2018
image from 2018 Cloud Security Report

2018 Cloud Security Report

Offering insight into a variety of issues related to cloud security, this report discusses several key issues, including, the biggest threats to cloud security, legacy security tools that do not work in the cloud, and the growth of cloud security budgets.

(more available)
Added: October 23, 2018
image from A Framework For Exploring Cybersecurity Policy Options

A Framework For Exploring Cybersecurity Policy Options

The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other.

(more available)
Added: October 23, 2018
image from Cybersecurity Preparedness and Response

Cybersecurity Preparedness and Response

This is a report based on a collaborative survey. Taken as a whole, there continues to be low hanging vulnerabilities which are not addressed in the middle market space. This survey is meant to highlight some of these vulnerabilities and provide risk professionals with a tool to help mitigate both privacy and security risk.

(more available)
Added: October 23, 2018
image from Examining The Costs and Causes of Cyber Incidents

Examining The Costs and Causes of Cyber Incidents

Researchers built a number of scanning devices using Raspberry Pi minicomputers and, by taking them out to athletic events and busy public spaces, found that tracking of individuals was possible.

(more available)
Added: October 23, 2018
image from Global Cloud Data Security Report Q1 2015

Global Cloud Data Security Report Q1 2015

From the report, “CipherCloud enables organizations to embrace cloud applications by protecting critical data going into the cloud. This approach has been adopted by millions of users in multiple industries, such as healthcare, banking and finance, telecommunications and government, across the globe. This report gathers insight from CipherCloud’s installed base and provides analysis on how enterprises approach cloud security and data protection.”

(more available)
Added: October 23, 2018
image from Key Findings from The Global State of Information Security Survey 2017

Key Findings from The Global State of Information Security Survey 2017

This initial paper explores how digital organizations are leveraging new technology safeguards to build a cybersecurity and privacy program that jumpstarts success—and creates a truly differentiating business capability.

(more available)
Added: October 23, 2018
image from MediaPro Best Practice Series: Battling The Forgetting Curve

MediaPro Best Practice Series: Battling The Forgetting Curve

This paper seeks to provide guidance in understanding the best ways to train employees so that the don’t forget important information.

(more available)
Added: October 23, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of various mobile app security methods including per-app VPN, containers, and micro-segmentation.”

(more available)
Added: October 23, 2018
image from Security Practices Guide For SOC 2 Compliance

Security Practices Guide For SOC 2 Compliance

This is a short guide for helping organizations become SOC 2 compliant.

Added: October 23, 2018
image from The CIO's Guide To Mobile Threat Defense

The CIO's Guide To Mobile Threat Defense

This is a handy guide for CIO’s that seeks to provide guidance for Mobile Threat Defense.

Added: October 23, 2018
image from The State of Online Privacy 2016

The State of Online Privacy 2016

This is a press release regarding a s study that finds more British Internet users are concerned about data privacy than losing their income.

(more available)
Added: October 23, 2018
image from 5G Security Architecture White Paper

5G Security Architecture White Paper

From the report, “We are now seeing the first incarnations of 5G technology. It provides many capabilities that make it a preferred platform for the digitalized world. Solid security is one of the strengths of 4G networks and the same is expected from 5G. This cannot, however, be achieved just by adapting 4G security features to 5G system because the 5G service palette is more than just an extension from that of 4G. Completely new security functionalities and services are needed in addition to enhanced versions of 4G security features.”

(more available)
Added: October 22, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 20:08 UTC (build b1d7be4)