- November 6, 2020Why Legacy Firewalls Are Ineffective in Securing Applications and Data in the Data CenterRethinking Firewalls: Security and Agility for the Modern Enterprise, sponsored by Guardicore, was conducted to learn how enterprises perceive their legacy firewalls within...Read More
- September 22, 2020The Need to Close the Cultural Divide between Application Security and DevelopersA security risk that many organizations are not dealing with is the cultural divide between application security and developers. In this research sponsored by ZeroNorth, we...Read More
- October 11, 2019New Research on Privileged Access Management Reveals the Status Quo Is Not SecurePonemon Institute is pleased to announce the release of a new study that presents four years of research on how elevated access to high-value information assets can be a se...Read More
- July 10, 2018Separating the Truths from the Myths in CybersecurityPonemon Institute is pleased to anounce the release of Separating the Truths from the Myths in Cybersecurity, sponsored by BMC. The purpose of this study is to better under...Read More
- June 8, 2018The Cyber Hygiene Index: Measuring the Riskiest StatesAre the residents of certain states more aware than others about the importance of maintaining a high level of readiness in order to prevent, detect and respond to cyber-re...Read More
- April 26, 2018Data Breaches Caused by Insiders Increase in Frequency and CostPonemon Institute and ObserveIT have released The 2018 Cost of Insider Threats: Global Study, on what companies have spent to deal with a data breach caused by a careless o...Read More
- April 25, 2018Ponemon Institute and Kilpatrick Townsend release The Second Annual Study on the Cybersecurity Risk to Knowledge AssetsThe key takeaway of this research is that companies’ awareness of the risk to knowledge assets has increased since the first study was conducted. Which is having a po...Read More
- March 15, 2018Ponemon Institute Announces the Release of the 2018 Megatrends StudyA major deterrent to achieving a strong security posture is the inability for IT professionals to know the big changes or megatrends in security threats that they need to b...Read More
- November 20, 2017The 2017 State of Endpoint Security Risk ReportPonemon Institute releases the latest study on the state of endpoint security risk, sponsored by Barkly. As this research reveals, today’s organizations are strugglin...Read More
- November 2, 2017The Evolving Role of CISOs and Their Importance to the BusinessWe are pleased to announce the release of The Evolving Role of CISOs and Their Importance to the Business. The realization is growing in the C-Suite that just one serious s...Read More
- October 1, 20172017 Cost of Cyber Crime StudyPonemon Institute is pleased to announce the release of the 2017 Cost of Cyber Crime report. Ponemon Institute conducted the first Cost of Cyber Crime study in the United S...Read More
- June 15, 20172017 Study on Mobile and Internet of Things Application SecurityPonemon Institute is pleased to present the findings of the 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan Technologies. The pu...Read More
- June 13, 20172017 Cost of Data Breach Study: United StatesIBM Security and Ponemon Institute are pleased to present the 2017 Cost of Data Breach Study: United States, our 12th annual benchmark study on the cost of data breach inci...Read More
- February 6, 20172016 Cost of Cyber Crime Study & the Risk of Business InnovationWe are pleased to present the 2016 Cost of Cyber Crime Study & the Risk of Business Innovation sponsored by Hewlett Packard Enterprise. This year’s study on the a...Read More
- October 25, 2016What are the 12 global trends in identity governance and access management?Ponemon Institute is pleased to present the findings of Global Trends in Identity Governance & Access Management, sponsored by Micro Focus. The purpose of this study is...Read More
- October 5, 2016Ponemon Institute and Cloudera announce a webinar on the state of cybersecurity big data analytics on October 11 at 10 AM PT/1 PM ET.By Dr. Larry Ponemon Big Data Cybersecurity Analytics, conducted by Ponemon Institute and sponsored by Cloudera, provides more evidence that the use of big data analytics i...Read More
- July 1, 2016SMBs are vulnerable to cyber attacksWe are pleased to announce the release of a study focused on the cybersecurity threat to small and medium-sized companies (SMBs). Based on the findings, we conclude that no...Read More
- June 30, 2016Throughout the world, MSSPs are improving security posture and fighting cyber threatsWe are pleased to announce the release of our first study dedicated to the topic of managed security services providers (MSSPs), sponsored by Raytheon. A key finding of the...Read More
- June 15, 2016Why Companies Need BCM Before They Have a Data BreachBy Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute We are pleased to announce the release of the 2016 Cost of Data Breach Study: The Impact of Business Continuit...Read More
- May 12, 2016Sixth Annual Benchmark Study on Privacy & Security of Healthcare DataWe are pleased to announce the release of the Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, sponsored by ID Experts. For the sixth year in a ro...Read More
- May 12, 2016Nearly 90 Percent of Healthcare Organizations Suffer Data Breaches, New Ponemon Study ShowsCriminal attacks from the outside and negligence from the inside continue to put patient data in the crossfire, the newly released Sixth Annual Benchmark Study on Privacy &...Read More
- March 18, 2016New Ponemon Study on Malware Detection & Prevention ReleasedThe State of Malware Detection & Prevention sponsored by Cyphort reveals the difficulty of preventing and detecting malware and advanced threats. The IT function also s...Read More
- March 16, 2016The State of Malware Detection & PreventionWe are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty of preventing and detecting...Read More
- March 2, 20162016 Global Encryption Trends StudyPonemon Institute is pleased to present the findings of the 2016 Global Trends Study, sponsored by Thales e-Security. We surveyed 5,009 individuals across multiple industry...Read More
- February 29, 2016Healthcare organizations are in the cross hairs of cyber attackersThe State of Cybersecurity in Healthcare Organizations in 2016, sponsored by ESET, found that on average, healthcare organizations represented in this study have experience...Read More
Blog
Categories
Tags
- Access Governance (1)
- Access Management (1)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (2)
- Application Security (3)
- Authentication Process (1)
- Best Practices (20)
- Big Data (2)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (4)
- Communication Inefficiency (1)
- Compliance (9)
- Confidential Data (1)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (1)
- Cryptography (2)
- Cyber Attack (1)
- Cyber Attacks (15)
- Cyber Crime (10)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (1)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (1)
- Cyber Threat (2)
- Cybersecurity Risk (1)
- Data Breach (30)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (4)
- Data Loss (1)
- Data Protection (24)
- Data Security (15)
- DDoS (1)
- Denial Of Service (1)
- Detection (1)
- Digital Certificate Management (1)
- DLP (2)
- Ecommerce Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encryption (4)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (6)
- Explanation Of Benefits (1)
- File Sharing (1)
- Fraud (3)
- Geo-location (1)
- Global Security (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Identity Governance (1)
- Incident Response (2)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (2)
- Intellectual Property (1)
- Internet Of Things (1)
- IT Architecture (1)
- IT Security (10)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- Managed Security Services Providers (1)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mixed Content Warnings (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (10)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- MSSP (1)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (2)
- Online Banking (1)
- Online Health Services (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- Post Breach (1)
- Privacy (8)
- Privacy Compliance (1)
- Privileged Access Management (1)
- Privileged User (1)
- Productivity (1)
- Providers (3)
- Ransomware (1)
- Regulated Data (1)
- Retail Banking (2)
- RIM Renaissance (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk To Knowledge Assets (1)
- SaaS (1)
- Safeguard High Value Assets (1)
- Security (7)
- Security Innovation (1)
- Security Intelligence (1)
- Security Posture (1)
- Security Professional (2)
- Security Risk (2)
- Security Strategy (2)
- Security Technologies (2)
- Security Threat (1)
- Senior Executives (2)
- SIEM (1)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SSO (1)
- State Of Endpoint (1)
- System Glitch (1)
- Technology (2)
- Threat Intelligence (6)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Vulnerable Code (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202020192018201720162015- January (7)
- February (1)
- April (4)
- May (4)
- June (1)
- August (1)
- September (2)
- October (4)
- November (1)
- December (1)
- January (4)
- February (4)
- March (4)
- April (3)
- May (2)
- June (3)
- July (2)
- September (2)
- October (3)
- December (1)
- January (2)
- February (6)
- March (1)
- May (2)
- June (2)
- July (1)
- August (2)
- September (2)
- October (1)
- December (1)