Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Know the game, not just the rules The changing face of cyber security

Know the game, not just the rules The changing face of cyber security

This paper seeks to prompt a discussion about how our mindset and approach to cyber security now needs to change. It proposes 10 areas where important challenges must be confronted; this evolution will also provide some structure for innovative and disruptive technologies that are beginning to come to market but don’t fit the mould of traditional security controls.

(more available)
Added: November 27, 2018
image from 2018 Consumer Survey: Attitudes And Behavior In A Post-Breach Era

2018 Consumer Survey: Attitudes And Behavior In A Post-Breach Era

We are living in a world where breaches of consumer privacy are a regular phenomenon. Breaches, such as the Cambridge Analytica-Facebook snafu and the Google+ leak, have dominated headlines in 2018, exposing the personal information of millions of people and shaking our trust in big brands. Many consumers are making drastic changes to the way they interact with brands online, and they believe businesses need to take ultimate responsibility for protecting their data. Ping Identity surveyed more than 3,000 consumers across the U.S., UK, France and Germany to examine consumer attitudes in a post-breach era to help businesses maintain trust and stay ahead of their customers’ expectations.

(more available)
Added: November 27, 2018
image from Closing The Gap On Breach Readiness

Closing The Gap On Breach Readiness

This e-book contains insights on breach readiness, response and resiliency based on in-depth interviews conducted with the Security for Business Innovation Council (SBIC). The SBIC is comprised of forward-thinking security executives from Global 1000 enterprises committed to advancing the state of information security worldwide by sharing insights from their real-world experience.

(more available)
Added: November 27, 2018
image from CIO'S Guide to Modern Identity

CIO'S Guide to Modern Identity

These days, IAM is a moving target being moved by the forces of cloud, mobile and increasingly connected consumers. By keeping these five trends in mind, and understanding the security and access control needs of your enterprise, you can make decisions that’ll benefit you today, while providing a good foundation for future evolution.

(more available)
Added: November 27, 2018
image from The Clock Is Ticking On Supply Chain Cybersecurity

The Clock Is Ticking On Supply Chain Cybersecurity

More than 40 executive-level representatives from primes to Tier 2 and consultants participated in an October 24th Roundtable on these topics. The roundtable was conducted under Chatham House Rules. Accordingly, this paper summarizes the discussion, with no identification of attendees.

(more available)
Added: November 24, 2018
image from Understanding And Managing Identity In The Digital Era

Understanding And Managing Identity In The Digital Era

Almost every individual and every business now has a cyberpresence that needs to be secured. Digital transformation has also created a growing supply of security targets in the form of information-rich storehouses of data. Identity and access management (IAM) platforms offer one way to tackle this problem. IAM platforms provide a set of solutions to identify users and control their access within an IT environment. However, modern identity isn’t just about security, privacy, or even convenience. The key value of an identity platform is enablement, in that it allows an organization to securely provide services to end users. It is all “Yes you can … but only you can.”

(more available)
Added: November 24, 2018
image from The Art Of War: Using Economics To Defeat Cyber Crime

The Art Of War: Using Economics To Defeat Cyber Crime

The ancient Chinese general Sun Tzu said “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” While it’s unrealistic to think we can win every battle against cyber criminals, Sun Tzu’s words have a lot to offer. The problem that every privacy and security team faces is how to defend on every possible front with finite resources and budget. And the simple answer is, you don’t have to.

(more available)
Added: November 24, 2018
image from New Malware Threats Demand Action From Healthcare Sector

New Malware Threats Demand Action From Healthcare Sector

This white paper examines challenges for healthcare organizations and presents how the key to effective endpoint and server protection lies in the ability to dynamically analyze behavior in order to recognize malicious software by its actions, not its appearance. Intelligent response at machine speed is required to prevent, contain and mitigate potential threats. Success in this mission results in a major benefit for providers and payers: the ability to keep IT systems operation so medical and non-medical personnel can stay focused on patient care.

(more available)
Added: November 24, 2018
image from Report On Improving Cybersecurity In The Health Care Industry

Report On Improving Cybersecurity In The Health Care Industry

This report provides information cultivated by the Task Force, which offers the opportunity to address significant cybersecurity concerns in the health care industry.

(more available)
Added: November 24, 2018
image from IT Forecast 2017; UK Trends and Challenges

IT Forecast 2017; UK Trends and Challenges

This report is based on independent research conducted by Smith & Harwood on behalf of Curo Talent®. We started by asking a simple question, “What has been your organisation’s technology focus for 2016?”

(more available)
Added: November 24, 2018
image from The Art Of Cyber War: A Modern Defense Strategy

The Art Of Cyber War: A Modern Defense Strategy

This report offers this key insight, “The heart of the tension between security and efficiency is the key vulnerability within your organization’s cyber security policy: employee passwords.” Read on to discover more.

(more available)
Added: November 24, 2018
image from Definitive Guide To Next-Generation Fraud Prevention

Definitive Guide To Next-Generation Fraud Prevention

This e-book offers insight into online fraud and cyber-crime.

Added: November 24, 2018
image from The Future of Digital Engagement In An Age of Compliance

The Future of Digital Engagement In An Age of Compliance

To find out how European enterprise customer data leaders are tackling this complex problem, Janrain conducted more than 50 interviews (see appendix 1 for interviewee profile), the findings of which are distilled into this eBook.

(more available)
Added: November 24, 2018
image from Consumer Attitudes Toward Data Privacy Survey

Consumer Attitudes Toward Data Privacy Survey

This survey shows many American consumers are in favor of regulations designed to give them greater control over how businesses use their personal data. 78% of them were aware of the Facebook data-sharing scandal, in which political consultancy firm Cambridge Analytica gained access to private information on more than 87 million Facebook users. 94% reported being generally concerned about their data and 57% said that the scandal made them even more concerned about their data privacy and security than they were before. The survey results show that many American consumers are open to regulations designed to give them greater control over how businesses use their personal data. 69% of those surveyed would like to see privacy laws like the European Union’s General Data Protection Regulation (GDPR) enacted in the US.

(more available)
Added: November 24, 2018
image from Under Siege: Achieving Cyber-Resiliency In An Evolving Healthcare Landscape

Under Siege: Achieving Cyber-Resiliency In An Evolving Healthcare Landscape

This report provides insight into the state of cybersecurity in Healthcare.

Added: November 24, 2018
image from Unseen Trheats, Imminent Losses: 2018 Midyear Security Roundup

Unseen Trheats, Imminent Losses: 2018 Midyear Security Roundup

In this midyear report, TrendMicro tracks the tendency of security risks to emerge from aspects of computing that are often overlooked and show how costly they can be especially for enterprises.

(more available)
Added: November 23, 2018
image from Law Firm Cybersecurity Scorecard Q1 2017

Law Firm Cybersecurity Scorecard Q1 2017

The Law Firm Cybersecurity Scorecard is issued quarterly and is part of their commitment to thoroughly study, understand, and report on the imminent amount and magnitude of threats faced by law firms today as well as the steps they are taking to mitigate the threat. To that point, per a recent Law 3603 report, law firm Managing Partners list cybersecurity as their number three priority, behind financial profits and generating revenue. Even though cybersecurity seems to be an area of particular focus, this scorecard will illustrate that law firms continue to struggle with making operational investments and instituting practices that do not provide a quantifiable financial return. Thus, they jeopardize their reputations, client relationships, and in some cases, financial well-being.

(more available)
Added: November 23, 2018
image from Law Firm Cyber Security Scorecard Q4 2017

Law Firm Cyber Security Scorecard Q4 2017

Data breach has become an existential risk to every law firm throughout the world regardless of the number of attorneys, revenues or practice areas. The Law Firm Cyber Security Scorecard is compiled by LOGICFORCE and published bi-annually to educate the legal industry on the current state of Cyber Security preparedness. This second edition also seeks to clearly define de facto cyber security standards for law firms so they can easily determine where their organizations rate in comparison.

(more available)
Added: November 23, 2018
image from Top Of Mind For Top U.S. Health Systems 2018

Top Of Mind For Top U.S. Health Systems 2018

To provide insight into some of the top trends in health IT, the Center for Connected Medicine partnered with The Health Management Academy to survey C-suite health system executives on health IT priorities for 2018. The quantitative and qualitative surveys focused on five areas: Cybersecurity, Consumer-Facing Technology, Virtual Care, Artificial Intelligence, and Predictive Analytics.

(more available)
Added: November 23, 2018
image from 2018 State of Cybersecurity in Small & Medium Size Businesses

2018 State of Cybersecurity in Small & Medium Size Businesses

Ponemon Institute is pleased to present the results of The 2018 State of Cybersecurity in Small and Medium Size Businesses sponsored by Keeper Security. The goal of this study is to track how small and medium size companies address the same threats faced by larger companies. This report features the findings from 2018 and 2017.

(more available)
Added: November 23, 2018
image from 2018 Cyber Claims Study

2018 Cyber Claims Study

The eighth edition of the NetDiligence® Cyber Claims Study offers insights for business innovation. In the same way that a business gains operational perspective by going through an audit, both the insurer and the insured can use the findings of this research to inform decision making and risk management.

(more available)
Added: November 23, 2018
  • ««
  • «
  • 52
  • 53
  • 54
  • 55
  • 56
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 00:08 UTC (build b1d7be4)