Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privacy

Below you will find reports with the tag of “Privacy”

image from Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

This guide provides an overview of connected or IoT medical devices, their benefits and risks, real life use cases and best practice security guidelines.

(more available)
Added: October 17, 2018
image from Security Report:The Evolving Role of CISOs

Security Report:The Evolving Role of CISOs

This report presents the consolodiated global findings to better understand the nature of the CISO role and reveal insights, challenges, and approaches to security strategy in today’s global threat landscape.

(more available)
Added: October 17, 2018
image from State Of Cloud Security 2018

State Of Cloud Security 2018

This paper provides insights into some of the latest cloud practices and technologies enterprise information security practitioners must be aware of as IT and sensitive data extends beyond the traditional corporate perimeter.

(more available)
Added: October 17, 2018
image from State Of Enterprise Resource Planning In Cloud Security

State Of Enterprise Resource Planning In Cloud Security

The main objective of the document is to provide a brief introduction to cloud ERP security. The targeted audience of this document includes IT and management professionals who oversee the business IT assets of their respective organizations.

(more available)
Added: October 17, 2018
image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
image from The Road To Compliance:Steps For Securing Data To Comply With The GDPR

The Road To Compliance:Steps For Securing Data To Comply With The GDPR

Here is another helpful eBook to provide insight into the GDPR compliance situation.

Added: October 17, 2018
image from 2016 State Of Privacy & Security Awareness

2016 State Of Privacy & Security Awareness

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 16, 2018
image from A Clearer View of Emerging Risks: Emerging Risks Report 2015

A Clearer View of Emerging Risks: Emerging Risks Report 2015

In this report, they examine four key areas where risks continue to emerge or, perhaps, more importantly, contain elements where the risks are unknown at this time: a) Cyber, b) Life, health and longevity, c) New Technologies, d)casualty catastrophe reserving.

(more available)
Added: October 16, 2018
image from Cyber Risk: Threat and Opportunity

Cyber Risk: Threat and Opportunity

The executive summary of this paper gives four points of discussion: a) Interest in cyber insurance has grown beyond expectations b) Cyber attacks and breaches have grown in frequency, and loss costs are on the rise c) Insurers are issuing an increasing number of cyber insurance policies and becoming more skilled and experienced at underwriting and pricing this rapidly evolving risk d) Some observers believe that cyber exposure is greater than the insurance industry’s ability to adequately underwrite the risk.

(more available)
Added: October 16, 2018
image from Cybercrime And Other Threats Faced By The Healthcare Industry

Cybercrime And Other Threats Faced By The Healthcare Industry

In this paper they discuss several aspects of the healthcare threat surface.

Added: October 16, 2018
image from Farewell To Audit Season

Farewell To Audit Season

This report discusses the new reality that audits and compliance are no longer a seasonal issue. It lays out some good steps for daily audits for the sake of compliance.

(more available)
Added: October 16, 2018
image from The Cost of Malware Containment

The Cost of Malware Containment

Ponemon Institute conducted this research to understand how much money organizations are wasting in their efforts to prevent malware driven threats and other malicious programs from stealing high value and confidential data. To ensure a knowledgeable participant, we surveyed 630 IT and IT security practitioners in the United States who are familiar with their organization’s practices for containing malware infections. They also have responsibility in detecting, evaluating and/or containing malware infections within their organization.

(more available)
Added: October 16, 2018
image from Written Testimony US House Committee On Energy And Commerce

Written Testimony US House Committee On Energy And Commerce

This is the transcript of testimony given before the US House Committee On Energy And Commerce.

Added: October 16, 2018
image from 2018 GDPR Compliance Report

2018 GDPR Compliance Report

This research uncovers the perspectives of organizations on the impact of the new regulation, how prepared they are, and how they plan to be in compliance with the new law to avoid significant penalties.

(more available)
Added: October 15, 2018
image from Cloud Best Practices:Audit Checklist For Endpoint Security

Cloud Best Practices:Audit Checklist For Endpoint Security

This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.

(more available)
Added: October 15, 2018
image from Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime

As required by General Assembly resolution 65/230, this Study has been prepared with a view to ‘examining options to strengthen existing and to propose new national and international legal or other responses to cybercrime.’ The mandate comes within the context of a number of other mandates and activities related to cybercrime and cybersecurity within the United Nations system. In this respect, the focus of the Study is limited to the crime prevention and criminal justice aspects of preventing and combating cybercrime.

(more available)
Added: October 15, 2018
image from Data Protection Under POPI

Data Protection Under POPI

This white paper provides insight into becoming complaint with South Africa’s Protection of Personal Information Bill. (POPI)

Added: October 15, 2018
image from Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

This project comprised two main research and development phases. The first phase of the project entailed a requirements analysis and architecture-design effort. For further details on this phase, please refer to the first study report. The second phase of the project entailed the development of a proof-of-concept toolbox. This report presents the proof-of-concept toolbox.

(more available)
Added: October 15, 2018
image from Enterprise IoT Security Blueprint: Requirements, Components, And Guidelines

Enterprise IoT Security Blueprint: Requirements, Components, And Guidelines

This paper provides a guide of all of the things an Enterprise should consider and implement in order to secure the Internet of Things.

(more available)
Added: October 15, 2018
image from Federal Information Security Modernization Act Report to Congress

Federal Information Security Modernization Act Report to Congress

The President of the United States’ Office of Management and Budget, prepared this report. This report covers the period from October 1, 2014, through September 30, 2015, and provides an update of ongoing information security initiatives, a review of Fiscal Year 2015 information security incidents, Inspector General assessments of agencies’ progress in implementing information security capabilities, and the Federal Government’s progress in meeting key information security performance measures based on agency submitted data.

(more available)
Added: October 15, 2018
image from General Data Protection Regulation: The Mobile Implications

General Data Protection Regulation: The Mobile Implications

This paper is designed to help businesses manage their mobile data risks in relation to GDPR, which will affect almost every global organisation.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 15
  • 16
  • 17
  • 18
  • 19
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)