Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privacy

Below you will find reports with the tag of “Privacy”

image from Guerilla Ad Clicker Targets Android Users

Guerilla Ad Clicker Targets Android Users

This report takes a look at a threat that specifically attacks Android users.

Added: October 15, 2018
image from HTTPS/SSL White Paper

HTTPS/SSL White Paper

For many organizations, dealing with HTTPS traffic is something of a double edge sword. Recent moves to encryption challenge the status quo in terms of organizational oversight. Finding a balance between competing interests will be critical to moving forward, but while present technology limitations hamper those efforts, technological advancements can enhance them.

(more available)
Added: October 15, 2018
image from Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

System designers have long struggled with the challenge of determining how to control when untrusted applica- tions may perform operations using privacy-sensitive sen- sors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors. Proposed research methods enable systems to infer the op- erations associated with user input events, but malicious applications may still trick users into allowing unexpected, stealthy operations. To prevent users from being tricked, we propose to bind applications’ operation requests to the associated user input events and how they were ob- tained explicitly, enabling users to authorize operations on privacy-sensitive sensors unambiguously and reuse such authorizations.

(more available)
Added: October 15, 2018
image from Security Privacy And The Next Generation Workforce

Security Privacy And The Next Generation Workforce

Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace.

(more available)
Added: October 15, 2018
image from Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

The Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data reveals that the majority of healthcare organizations represented in this study have experienced multiple data breaches. Despite the increased frequency of breaches, the study found that many organizations lack the money and resources to manage data breaches caused by evolving cyber threats, preventable mistakes, and other dangers.

(more available)
Added: October 15, 2018
image from State Of Privacy & Security Awareness In Retail

State Of Privacy & Security Awareness In Retail

This report provides data to help understand the need of helping employees understand PCI compliance in the retail industry.

Added: October 15, 2018
image from The GDPR:Key Themes And Challenges

The GDPR:Key Themes And Challenges

This helpful report provides analysis of the GDPR, some misconceptions, and some helpful tips for becoming compliant.

Added: October 15, 2018
image from The Global State Of Online Digital Trust

The Global State Of Online Digital Trust

The digital trust perception gap, and other findings in this ground-breaking study, highlight the need for business leaders to understand how much consumers trust organizations, what drives digital trust, and the business impact of losing that trust.

(more available)
Added: October 15, 2018
image from 2016 State Of Privacy & Security Awareness: The Story Behind The Story

2016 State Of Privacy & Security Awareness: The Story Behind The Story

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 14, 2018
image from 2017 Data Threat Report Global Edition

2017 Data Threat Report Global Edition

This report from 2017 is based on a survey conducted during October and November of 2016. They surveyed over a thousand senior security executives from across the globe, including from key regional markets in the US, UK, Germany, Japan, Australia, Brazil, and Mexico, and key segments such as federal government, retail, finance, and healthcare.

(more available)
Added: October 14, 2018
image from 2017 Fintech Security Analysis Report

2017 Fintech Security Analysis Report

This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises.

(more available)
Added: October 14, 2018
image from 2017 IT Security Privacy Survey

2017 IT Security Privacy Survey

When tackling cyber risk, board involvement and effective communication continue to drive performance. Learn more in this report on the key findings from Protiviti’s 2017 Security and Privacy Survey.

(more available)
Added: October 14, 2018
image from A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

This paper discusses how the GDPR will affect you as a non-European company and provides insights into what you should do to prepare.

(more available)
Added: October 14, 2018
image from A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

This special report brought to you by the folks at Symantec, takes a hard look at the security issues that surround smart speakers.

(more available)
Added: October 14, 2018
image from Android Is Ready For The Enterprise

Android Is Ready For The Enterprise

This report offers insight into Android and its use in the modern enterprise.

Added: October 14, 2018
image from Are Wireless Medical Devices "Hospital Grade?"

Are Wireless Medical Devices "Hospital Grade?"

This paper will take a quick look at two real-world examples of product releases gone wrong and overview the risks & challenges inherent in optimizing performance of wireless medical devices. They then outline best practices for cost-effectively mitigating risk and euring quality in life-critical deployment scenarios.

(more available)
Added: October 14, 2018
image from Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware

Behind The Hidden Conversion Of Electricity To Money: An In-Depth Analysis of XMR Cryptominer Malware

This paper provides an in-depth look at current cryptominer trends and the technology behind Monero. Additionally, it explores the projected attack methods that threat actors are likely to adopt, as well as tactics and best practices that security teams can utilize to keep themselves on the right side of this emerging cat-and-mouse game.

(more available)
Added: October 14, 2018
image from BREACH REPORT 2015: Protected Health Information

BREACH REPORT 2015: Protected Health Information

This is Redspin’s 6th annual Breach Report: Protected Health Information (PHI). At the conclusion of each year, they analyze the complete statistical data set of large breaches that have been reported to HHS. In the report, they assess the overall effectiveness of the current policies and controls designed to safeguard PHI. In 2105, they identify significant trends and draw attention to the specific areas most in need of improvement. They then offer Redspin’s recommendations for preventive measures and corrective actions to address any critical gaps or weaknesses. Their goal is to help the healthcare industry continually improve its ability to protect patient information.

(more available)
Added: October 14, 2018
image from Data Breach Digest: IoT Calamity, The Panda Monium

Data Breach Digest: IoT Calamity, The Panda Monium

This is a report based on a one man’s experience with IoT security.

Added: October 14, 2018
image from Enhancing Resilience through Cyber Incident Data Sharing and Analysis

Enhancing Resilience through Cyber Incident Data Sharing and Analysis

This document enumerates and evaluates consensus data categories that enterprise risk owners and insurers could use to assess risks, identify effective controls, and improve cybersecurity culture and practice. It is the second in a series of white papers.

(more available)
Added: October 14, 2018
image from Security Response: How safe is your quantified self?

Security Response: How safe is your quantified self?

Fueled by technological advances and social factors, the quantified self movement has experienced rapid growth. Quantified self, also known as self-tracking, aims to improve lifestyle and achievements by measuring and analyzing key performance data across a range of activities. This report deals with the threats and vulnerabilities that are present in the devices used to provide those measurements and analysis.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 15
  • 16
  • 17
  • 18
  • 19
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)