Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privacy

Below you will find reports with the tag of “Privacy”

image from GDPR An Action Plan For Cloud Readiness

GDPR An Action Plan For Cloud Readiness

This E-Book discusses ways to become GDPR Compliant.

Added: October 22, 2018
image from Heads In The Cloud: Misconceptions Hindering Enterpise Cloud Adoption

Heads In The Cloud: Misconceptions Hindering Enterpise Cloud Adoption

Almost all (99%) surveyed ITDMs say that there is or was at least one driver for their organization moving to the cloud. But for all the exuberance surrounding cloud and SaaS, the majority (94 percent) of ITDMs interviewed have or have had at least one concern about their organization moving to the cloud, the most common being data privacy (61 percent).

(more available)
Added: October 22, 2018
image from Healthcare Apps In The BYOD World

Healthcare Apps In The BYOD World

This white paper reviews the current state of healthcare apps and device-centric mobile application management, then offers an improved, app-centric approach to mobile security.

(more available)
Added: October 22, 2018
image from How much does Cyber/Data Breach Insurance Cost?

How much does Cyber/Data Breach Insurance Cost?

A sampling of clients’ actual cyber/data breach insurance policy annual premiums.

Added: October 22, 2018
image from Know Your Data To Create Actionable Policy

Know Your Data To Create Actionable Policy

Too often, security and risk (S&R) leaders create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data — from what data they have to where it resides. As a result, many policies are ineffective and can even hinder business processes. In today’s evolving data economy, data identity is the missing link that S&R leaders must define to create actionable policy. This report was designed to help S&R leaders develop effective policies using their Data Security And Control Framework as a guideline.

(more available)
Added: October 22, 2018
image from Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology.

(more available)
Added: October 22, 2018
image from NFP Governance And Performance Study

NFP Governance And Performance Study

This report analyzes non-profit organizations in Australia and in particular, sought to understand how important cybersecurity issues were to those organizations.

(more available)
Added: October 22, 2018
image from NIST Special Publication 800-171 for higher educatino

NIST Special Publication 800-171 for higher educatino

This is a guide that is especially designed to help colleges and universities comply with new federal regulations.

Added: October 22, 2018
image from Sensitive Data At Risk:The SANS 2017 Data Protection Survey

Sensitive Data At Risk:The SANS 2017 Data Protection Survey

This report is based on a survey that sought to see how organizations were protecting their data.

Added: October 22, 2018
image from The Security Provisions OF GDPR

The Security Provisions OF GDPR

The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice.

(more available)
Added: October 22, 2018
image from Three Pillars For Successfully Addressing the GDPR

Three Pillars For Successfully Addressing the GDPR

This white paper offers you a strategic framework that can help your organization manage the complexity of GDPR and build an ongoing compliance program.

(more available)
Added: October 22, 2018
image from Three-Part Guide To Developing A BYOD Strategy

Three-Part Guide To Developing A BYOD Strategy

This paper is subtitled “An IT Architect’s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy”

Added: October 22, 2018
image from Unlocking B2B SaaS Growth With Identity Management

Unlocking B2B SaaS Growth With Identity Management

SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.

(more available)
Added: October 22, 2018
image from Whitepaper: Legislation And The Impact On Data Privacy

Whitepaper: Legislation And The Impact On Data Privacy

From the paper, “In March 2017, the expectation of privacy while surfing the internet disappeared in the United States. Congress voted to eliminate the broadband privacy rules that required internet service providers (ISPs) to get explicit consent from consumers before selling or sharing web browsing data and other private information to third parties. With no rules in place to protect personal or corporate web browsing data, there are a few proactive steps to take to help safeguard this information.”

(more available)
Added: October 22, 2018
image from 2017 Cloud Security Report

2017 Cloud Security Report

This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others.

(more available)
Added: October 21, 2018
image from 2018 Gambling Report

2018 Gambling Report

iovation offers their unique insight into the igaming industry. They provide observations of the trends in 2017 and look ahead to the future of the industry in 2018.

(more available)
Added: October 21, 2018
image from 5th Annual State of Application Security Report

5th Annual State of Application Security Report

Arxan’s 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality

Added: October 21, 2018
image from 6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

This white paper presents the key best practices for law firms of all sizes that want to to enable cloud-based file sharing while protecting sensitive data.

(more available)
Added: October 21, 2018
image from Cryptocurrency Mining Malware

Cryptocurrency Mining Malware

This e-book provides a helpful analysis of malware that mines cryptocurrency.

Added: October 21, 2018
image from Cybersecurity Survey

Cybersecurity Survey

Based on a 2015 survey of more than 100 major Canadian organizations across all major sectors, this paper sets out to prove that with additional focus, investment, and increased maturity, not all breaches need to be the size or have the impact that we have seen recently reported.

(more available)
Added: October 21, 2018
image from Dealing With The New EU GDPR

Dealing With The New EU GDPR

This paper takes a look at the GDPR and asks if your organization is ready for it.

Added: October 21, 2018
  • ««
  • «
  • 11
  • 12
  • 13
  • 14
  • 15
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 12:08 UTC (build b1d7be4)