Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privacy

Below you will find reports with the tag of “Privacy”

image from Identity Theft In America

Identity Theft In America

This report provides an overlook at Identity Theft in America and how it can be prevented.

Added: October 21, 2018
image from Innovation Insight For Unstructured Data Classification

Innovation Insight For Unstructured Data Classification

From the report, “The perpetually expanding volume and propagation of the unstructured data being stored and used by organizations is making information increasingly difficult to secure. Security and risk management leaders who implement data classification technologies will greatly enhance their chances of success.”

(more available)
Added: October 21, 2018
image from Malicious Bots On Property Portals

Malicious Bots On Property Portals

The Malicious Bots on Property Portals - Avoiding Common Engineering Pitfalls eBook is the re- sult of analyses conducted on some of the top property portals (aka, real estate websites) in the world. The report outlines various hidden issues found in property portals that can be exploited to scrape data.

(more available)
Added: October 21, 2018
image from Microsoft As A Trusted Advisor And Partner On Cyber Resilience

Microsoft As A Trusted Advisor And Partner On Cyber Resilience

This whitepaper provides information about developing your organization’s cyber resiliance.

Added: October 21, 2018
image from Mobile Wi-Fi Security Report

Mobile Wi-Fi Security Report

This report is designed to inform you of the many dangers of Wi-Fi, and how to deal with them.

Added: October 21, 2018
image from Modern Database Architecures Demand Modern Data Security Measures

Modern Database Architecures Demand Modern Data Security Measures

The objective of this report is to provide an understanding into how companies are approaching the challenges of evolving database ecosystems though cloud and big data initiatives. And to understand what steps organizations are taking to ensure greater security and compliance with their databases.

(more available)
Added: October 21, 2018
image from Rogueware Reborn: A Business Analysis Of A Growing Fraud In Android

Rogueware Reborn: A Business Analysis Of A Growing Fraud In Android

Rogueware has been reborn in the Android ecosystem, particularly on Google Play. This research paper reveals that hundreds of antivirus and optimization tool apps on Google Play mislead users into believing that they have a virus or performance problems on their devices to manipulate them to install other fake tools.

(more available)
Added: October 21, 2018
image from Smartly Selected Infrastructure For GDPR Compliance

Smartly Selected Infrastructure For GDPR Compliance

This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance.

(more available)
Added: October 21, 2018
image from The Rising Strategic Risks of Cyberattacks

The Rising Strategic Risks of Cyberattacks

Research by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation.

(more available)
Added: October 21, 2018
image from The Tao Of Mobile App DevSecOps: Building A Mobile App Sec Factory

The Tao Of Mobile App DevSecOps: Building A Mobile App Sec Factory

This report seeks to aid the reader in developing a better way to create apps and not compromise on security.

(more available)
Added: October 21, 2018
image from The Value Of Data

The Value Of Data

This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place.

(more available)
Added: October 21, 2018
image from Western Europe Security 2016 Predictions

Western Europe Security 2016 Predictions

A thorough infographic detailing predictions for the future of Western Europe Cyber security.

Added: October 21, 2018
image from What iOS11 Means To The Enterprise

What iOS11 Means To The Enterprise

This report offers insight into iOS11 and how Apple technology is providing useful resources to enterprises that are moving away from PC’s.

(more available)
Added: October 21, 2018
image from 2016 Global Encryption Trends Study

2016 Global Encryption Trends Study

The purpose of this research is to examine how the use of encryption has evolved over the past 11 years and the impact of this technology on the security posture of organizations. The first encryption trends study was conducted in 2005 for a US sample of respondents.3 Since then we have expanded the scope of the research to include respondents in all regions of the world.

(more available)
Added: October 20, 2018
image from 2018 Enterprise Cloud Trends

2018 Enterprise Cloud Trends

In February and March 2018, iboss and Vanson Bourne surveyed IT decision makers and office workers in large U.S. organizations to learn more about the trends influencing enterprise cloud adoption. The survey found that both office workers and IT decision makers understood the benefits of SaaS applications but were concerned about the security implications.

(more available)
Added: October 20, 2018
image from Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach

Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach

GAO was asked to report on the major breach that occurred at Equifax in 2017. This report (1) summarizes the events regarding the breach and the steps taken by Equifax to assess, respond to, and recover from the incident and (2) describes actions by federal agencies to respond to the breach.

(more available)
Added: October 20, 2018
image from An Integrated Vision To Manage Cyber Risk

An Integrated Vision To Manage Cyber Risk

This report lays out a new strategy for addressing cybersecurity issues.

Added: October 20, 2018
image from Building Technology Infrastructure For Learning

Building Technology Infrastructure For Learning

This report from the Department Of Education provides insight into good technoglogy infrastructure for educational purposes.

Added: October 20, 2018
image from Data Risk in the Third-Party Ecosystem

Data Risk in the Third-Party Ecosystem

This paper was written to understand understand how organizations qualify and quantify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident.

(more available)
Added: October 20, 2018
image from JWT Handbook

JWT Handbook

Ever wondered how JWT came to be and what problems it was designed to tackle? Are you curious about the plethora of algorithms available for signing and encrypting JWTs? Or are you interested in getting up-to-speed with JWTs as soon as possible? Then this handbook is for you.

(more available)
Added: October 20, 2018
image from Lack Of Visibility Drives Public Cloud Security Risk

Lack Of Visibility Drives Public Cloud Security Risk

Ixia recently commissioned Dimensional Research to conduct a survey of cloud users to understand their top concerns about managing cloud operations. This report provides details about their findings.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 12:08 UTC (build b1d7be4)