MEASURING TRUST IN PRIVACY AND SECURITY
Ponemon Institute
Sign Up for the Ponemon News Feed for special reports and important updates regarding privacy and security

News & Updates

Ponemon Institute is pleased to announce the release of Flipping the Economics of Attacks, sponsored by Palo Alto Networks. In this study, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.

...more


Blog Archives for February 2014
The Impact of IT Transformation on Enterprise Computing
February 4, 2014, 3:30 pm

We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by the Logicalis Corporation and HP.  The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges to advancing through each stage and how successful progression can improve an organization’s IT effectiveness, including IT security.

A key takeaway from this research is how IT transformation at various stages can influence the effectiveness and efficiency of enterprise computing. We believe organizations engaged in the IT transformation journey will find the experiences represented in this research helpful in making the case for investing resources to progress through the IT transformation stages. We hope you will take the time to download the report.
(click to download study)

Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations
February 12, 2014, 2:00 pm

What does a security team tell the CEO and board when a cyber attacker robs the company’s IP or shuts down the networks? CISOs face job insecurity because of the difficulty in being able to gather the threat intelligence quickly enough to know the “who,” “what,” “where,” “how” and “why” to respond and resolve an attack. The study reveals that many reports to senior management about a cyber attack are modified, filtered or watered down because the CISO does not have accurate and actionable threat intelligence.  What needs to be done? The consensus among the IT security practitioners surveyed is that they need the time and tools to discover and understand the nature of attacks faster with greater precision. To learn more about the current state of cyber attack responsiveness, we hope you will read Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations sponsored by AccessData. For a copy of the full report, please click here.

Categories
Security (23)
Privacy (22)
global security (1)
Providers (1)