Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privacy

Below you will find reports with the tag of “Privacy”

image from Mobile Security Report: 2017 Spotlight Report

Mobile Security Report: 2017 Spotlight Report

This mobile security report provides insights into the events of 2017.

Added: October 20, 2018
image from Privacy by Design & GDPR

Privacy by Design & GDPR

This paper provides a clearly articulated look at the GDPR.

Added: October 20, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2016)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2016)

October 2016 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 20, 2018
image from The Path To Rapid GDPR Compliance

The Path To Rapid GDPR Compliance

This white paper looks at some insights into the journey of reaching compliance with the GDPR and its May 2018 deadline. It seeks to share best practice guidelines for all businesses that have clients in Europe.

(more available)
Added: October 20, 2018
image from Thought Leadership 2016 Programme: Key Findings

Thought Leadership 2016 Programme: Key Findings

The 2016 Thought Leadership programme convened by Corsham Institute, in conjunction with RAND Europe and St George’s House, examined a number of crucial dimensions of our connected society. The programme facilitated the gathering of a diverse set of experts and influential leaders from various sectors to discuss challenges and opportunities, share experiences, and build a network. To give a brief glimpse of these discussions, we have produced this Key Findings report to provide participants, stakeholders and interested parties with a strong sense of both the subjects covered during our deliberations, as well as some of the issues, which still need to be tackled going forward.

(more available)
Added: October 20, 2018
image from 2016 Cost of Data Center Outages

2016 Cost of Data Center Outages

Previously published in 2010 and 2013, the purpose of this third study is to continue to analyze the cost behavior of unplanned data center outages. According to our new study, the average cost of a data center outage has steadily increased from $505,502 in 2010 to $740,357 today (or a 38 percent net change).

(more available)
Added: October 19, 2018
image from 2016 Mobile Security Report

2016 Mobile Security Report

From the report, “We present this report, gleaned from our database of mobile security intelligence, to help IT and security pros make informed decisions about managing and securing mobile devices, mobile apps, and their enterprises’ mobile ecosystem.”

(more available)
Added: October 19, 2018
image from 2018 Threat Predictions

2018 Threat Predictions

This is a helpful infographic that reveals threat predictions for 2018.

Added: October 19, 2018
image from Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

Ad-Supported Apps: How Personal Data Collection Hides In Plain Sight & Puts Mobile Users And Enterprises At Risk

From the report, “The Appthority Mobile Threat Team analyzed iOS apps in enterprise environments and found over 24,000 unique apps that access various types of user data, such as the calendar, bluetooth and photos, for advertising. These twenty-four thousand apps are just those that are up front with the user about requesting permission to access data for advertising purposes. Over 70% of enterprise environments contain these apps.”

(more available)
Added: October 19, 2018
image from Best Practices:Mitigating Insider Threats

Best Practices:Mitigating Insider Threats

From the report, “Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. it’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data in order to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. this report describes how to build an insider threat program.”

(more available)
Added: October 19, 2018
image from CENTRI 2017 Security Report Research And Roundtable

CENTRI 2017 Security Report Research And Roundtable

The purpose of this report is to look at some of the key security issues the industry is facing now in terms of what problems exist and possible solutions. It also looks at what’s being done, what’s not being done, and what should and could be done.

(more available)
Added: October 19, 2018
image from Control Business Data Risks Through End User Data Protection And Governance

Control Business Data Risks Through End User Data Protection And Governance

This Technology Spotlight examines the need for increased visibility and control to better manage and mitigate the risk presented by a decentralized corporate data environment.

(more available)
Added: October 19, 2018
image from French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

French Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In French Cities

This paper takes a look at the cities of France, and the cyber threats that occurred there.

Added: October 19, 2018
image from Global Advanced Threat Landscape Survey 2018: Focus On DevOps

Global Advanced Threat Landscape Survey 2018: Focus On DevOps

The CyberArk Advanced Threat Landscape 2018 annual report is the 11th of its kind and will be released in three parts. This is part one, focusing on how privileged account security is incorporated into DevOps processes.

(more available)
Added: October 19, 2018
image from Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

On behalf of the National Institute of Justice (NIJ) and as part of the Priority Criminal Justice Needs Initia- tive, the RAND Corporation, in partnership with the Police Executive Research Forum, organized a workshop in May 2017 on Challenges with Law Enforcement Access to Digital Evidence Held in Remote Data Centers. Discussions focused on ambiguities in U.S. law and procedure, challenges associated with using the Mutual Legal Assistance Treaty (MLAT) process, issues stemming from inadequate cooperation between law enforcement and service providers (the companies and organizations providing remote storage, communication, and computing services), and technical issues related to evidence residing in the cloud.

(more available)
Added: October 19, 2018
image from Internet Trends 2016 Code Conference

Internet Trends 2016 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 19, 2018
image from Overcoming GDPR Compliance Challenges

Overcoming GDPR Compliance Challenges

This report introduces GDPR and the challenges that are involved and then discusses measures that organisations can take in order to boost their data protection capabilities. It also looks at the pitfalls to avoid as they can derail the overall programme. It is intended for those organisations that are working down the path to compliance and that are looking for guidance in how compliance can be achieved.

(more available)
Added: October 19, 2018
image from Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Ever since the new European regulation on the protection of personal data (GDPR) was voted in, businesses have started their countdown to the transition that will take place in May 2018. They now have less than 2 years to comply with the new European regulation and the consequences of its new requirements in terms of data protection: strengthened cybersecurity, liability of data collection entities and new mandatory procedures. For organizations, what this entails now is the need to review their procedures and ensure their regulatory compliance before it starts raining sanctions.This white paper aims to address the question by providing a simplified interpretation of the regulation and practical solutions for a smooth transition.

(more available)
Added: October 19, 2018
image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

October 2015 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 19, 2018
image from The Emotional Side of Virtualization

The Emotional Side of Virtualization

Virtualization is a strategic priority at large companies, and trust plays a crucial role in their choice of cloud service provider and in determining the type of data they store outside company infrastructure, according to a Bitdefender survey of 503 IT decision makers at companies in the US, the UK and Germany with more than 1,000 PCs. Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment, and CIOs have to adapt to the new world. This survey, carried out by iSense Solutions, reveals why companies virtualize, which countries CIOs trust and what kind of data companies care most about.

(more available)
Added: October 19, 2018
  • ««
  • «
  • 13
  • 14
  • 15
  • 16
  • 17
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)