Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Standard

Below you will find reports with the tag of “Security Standard”

image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from The True Cost Of Compliance With Data Protection Regulations

The True Cost Of Compliance With Data Protection Regulations

Ponemon Institute and Globalscape conducted The True Cost of Compliance with Data Protection Regulations to determine the full economic impact of compliance activities for a representative sample of 53 multinational organizations. An earlier study was completed in 2011 and those findings are compared to this year’s results.

(more available)
Added: October 19, 2018
image from Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

The aim of this paper is to establish a database on studies, articles and working papers on cyber risk and cyber risk insurance.Based on this, we provide insurance practitioners and academics a high-level overview of the main research topics and future research directions in the field.

(more available)
Added: October 18, 2018
image from Mobile App Security Program Management Handbook

Mobile App Security Program Management Handbook

From the report, “While I call this document a ‘getting started guide,’ regardless of your program’s maturity I think you’ll find some helpful hints regarding the people, process, and technology that can elevate your mobile app security program to the next level.”

(more available)
Added: October 18, 2018
image from 3 Must Have Ways To Analyze Mobile For GDPR Compliance

3 Must Have Ways To Analyze Mobile For GDPR Compliance

This paper seeks to aid organizations with analyzing mobile use and GDPR Compliance.

Added: October 17, 2018
image from Annual Incident Reports 2015

Annual Incident Reports 2015

This report is an analaysis of Article 13a annual incident reports in the telecomm sector of the EU.

Added: October 17, 2018
image from Annual Information Security Report 2015

Annual Information Security Report 2015

This “Information Security Report 2015” presents the Fujitsu Group’s information security-related activities.

Added: October 17, 2018
image from Exploring Cyber Security Policy Options In Australia

Exploring Cyber Security Policy Options In Australia

In December 2016, RAND and the National Security College at The Australian National University partnered to facilitate a cyber security–focused 360o Discovery Exercise in Canberra. The exercise used plausible scenarios to explore the chal- lenges Australia faces in securing cyberspace by placing pres- sure on government authorities, industry capabilities, users’ tolerance for malicious cyber activity, and the ability to develop interdisciplinary solutions to pressing cyber security challenges. The scenarios considered the security of the Internet of Things and intellectual property theft against a backdrop of evolving international norms of behaviour in cyberspace.

(more available)
Added: October 17, 2018
image from The Evolution Of Network Access Control

The Evolution Of Network Access Control

This whitepaper discusses the growing network security issues caused by IoT, BYOD, and other issues occuring in cyber technology.

Added: October 17, 2018
image from "Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

"Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

This report takes a look at some of the problems in AI, and machine based cyber security, and seeks to show how they can be overcome.

(more available)
Added: October 16, 2018
image from Farewell To Audit Season

Farewell To Audit Season

This report discusses the new reality that audits and compliance are no longer a seasonal issue. It lays out some good steps for daily audits for the sake of compliance.

(more available)
Added: October 16, 2018
image from Achieving A Competitive Advantage Through Application Security

Achieving A Competitive Advantage Through Application Security

This paper provides 5 key takeaways from a survey of IT professionals and executives who make software purchasing decisions for their organization.

(more available)
Added: October 15, 2018
image from Always On. Always Up.

Always On. Always Up.

This white paper is geared towards the energy industry and learning about how network security can help maintain cybersecurity protections specifically in that industry.

(more available)
Added: October 15, 2018
image from Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

This project comprised two main research and development phases. The first phase of the project entailed a requirements analysis and architecture-design effort. For further details on this phase, please refer to the first study report. The second phase of the project entailed the development of a proof-of-concept toolbox. This report presents the proof-of-concept toolbox.

(more available)
Added: October 15, 2018
image from Enterprise IoT Security Blueprint: Requirements, Components, And Guidelines

Enterprise IoT Security Blueprint: Requirements, Components, And Guidelines

This paper provides a guide of all of the things an Enterprise should consider and implement in order to secure the Internet of Things.

(more available)
Added: October 15, 2018
image from 2017 Data Threat Report Global Edition

2017 Data Threat Report Global Edition

This report from 2017 is based on a survey conducted during October and November of 2016. They surveyed over a thousand senior security executives from across the globe, including from key regional markets in the US, UK, Germany, Japan, Australia, Brazil, and Mexico, and key segments such as federal government, retail, finance, and healthcare.

(more available)
Added: October 14, 2018
image from Best Practices For Web Application Firewall Management

Best Practices For Web Application Firewall Management

The experts at TrustWave have prepared this report to outline the issues and practices for web application firewall management.

Added: October 14, 2018
image from Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

In this paper, they explore the underlying challenges with regard to Cyber Risk management and analyze the nature of increasingly stringent regulatory demands. Putting these pieces together, they frame five strategic moves which they believe will enable business needs, their fiduciary responsibilities with regard to Cyber Risk, and regulatory requirements.

(more available)
Added: October 14, 2018
image from Is Security Accelerating Your Business

Is Security Accelerating Your Business

This blog post discusse the issues surrounding business data security, and provides some steps that can be taken to improve the situation.

(more available)
Added: October 14, 2018
image from Protecting The Crown Jewels In The Pivot To Digital Transformation

Protecting The Crown Jewels In The Pivot To Digital Transformation

This white paper by Onapsis and HMG Strategy will explore best practices for securing vital information contained in SAP and Oracle systems for those organizations that are shifting to a digital environment. In the pages that follow, discover the top security risks associated with mission-critical systems along with recommended approaches for mitigating those risks.

(more available)
Added: October 14, 2018
image from App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

App-Centric Security Meeting The Needs Of The Modern Mobile Enterprise

This report seeks to clarify how app-centric security approaches can aid flexibility in a rapidly changing mobile world.

Added: October 13, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 16:08 UTC (build b1d7be4)