Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privilege Abuse

Below you will find reports with the tag of “Privilege Abuse”

image from Data Breach Digest: Perspective Is Reality

Data Breach Digest: Perspective Is Reality

This report offers a helpful understanding of data breaches.

Added: October 17, 2018
image from GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

GDPR Advisory #2: Detecting And Responding Rapidly To Personal Data Breaches

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 16, 2018
image from The Update Framework Security Assessment

The Update Framework Security Assessment

During the summer of 2017, a study was done on the security issues related to the TUF framework.

Added: October 16, 2018
image from Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime

As required by General Assembly resolution 65/230, this Study has been prepared with a view to ‘examining options to strengthen existing and to propose new national and international legal or other responses to cybercrime.’ The mandate comes within the context of a number of other mandates and activities related to cybercrime and cybersecurity within the United Nations system. In this respect, the focus of the Study is limited to the crime prevention and criminal justice aspects of preventing and combating cybercrime.

(more available)
Added: October 15, 2018
image from GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

GDPR Advisory #4: GDPR Compliance To Help Protect Against Liability

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 15, 2018
image from Security Privacy And The Next Generation Workforce

Security Privacy And The Next Generation Workforce

Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace.

(more available)
Added: October 15, 2018
image from The Danger Within: Unmasking Insider Threats

The Danger Within: Unmasking Insider Threats

This eBook outlines the who, what, why and how of the insider threat to expose risks you may not be considering, and provides guidance to help you prevent and detect these costly attacks.

(more available)
Added: October 15, 2018
image from The Right To Be Forgotten

The Right To Be Forgotten

This paper is intended to support those preparing their organisation for the General Data Protection Regulation (GDPR) and considering what the Right to be Forgotten (RtbF) means for their organisation.

(more available)
Added: October 14, 2018
image from Spies In The Enterprise

Spies In The Enterprise

Bitglass reports on the results of their survey regarding how cybersecurity teams are mitigating various threats in the cloud.

Added: October 13, 2018
image from A Guide To Content Filtering For Mobile

A Guide To Content Filtering For Mobile

This report covers the challenges, trends and benefits of Content Filtering in a mobile-first environment.

Added: October 12, 2018
image from A Priviliged Account Security Approach To GDPR Readiness

A Priviliged Account Security Approach To GDPR Readiness

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 12, 2018
image from A Technical Solutions Guide For Privileged Password And Session Management Use Cases

A Technical Solutions Guide For Privileged Password And Session Management Use Cases

Despite the number of data breach stories in the news, many IT organizations fall into the easy trap of using shared accounts for users, administrators, or applications. While this practice means that, when access is needed, everyone can easily pitch in to get the work done, it comes with massive, unjustifiable security and compliance tradeoffs. This paper seeks to provide assistance with these situations.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 9, 2025 12:08 UTC (build b1d7be4)