<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title><![CDATA[Blog]]></title>
    <link>http://www.ponemon.org/</link>
    <description><![CDATA[]]></description>
    <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    <item>
      <title><![CDATA[What are the 12 global trends in identity governance and access management?]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/what-are-the-12-global-trends-in-identity-governance-and-access-management</link>
      <description><![CDATA[<p>
	&nbsp;</p>
<p>
	Ponemon Institute is pleased to present the findings of Global Trends in Identity Governance &amp; Access Management, sponsored by Micro Focus. The purpose of this study is to understand companies&rsquo; ability to protect access to sensitive and confidential information and what they believe is necessary to improve the protection. All participants in this study are involved in providing end users access to information resources in their organizations. Some of the trends discussed in the report are:</p>
<p>
	1. Employees are frustrated with access rights processes, and IT security is considered a bottleneck.</p>
<p>
	2. Responding to requests for access is considered slow.</p>
<p>
	3. Control over access management is decentralized.</p>
<p>
	4. Certain technologies are considered an important part of meeting identity governance and access management requirements.</p>
<p>
	5. A single-factor authentication approach is no longer effective.</p>
<p>
	6. Integration of machine learning within identity governance solutions is critical (64 percent of respondents).</p>
<p>
	7. The most difficult access policies to implement are those for enforcing access policies in a consistent fashion across all information resources in the organization.</p>
<p>
	8. End users have more access than they should.</p>
<p>
	9. Migration to Mobile First and mobile platforms has affected access management approaches.</p>
<p>
	10. New threats created by disruptive technologies will reduce organizations&rsquo; ability to mitigate governance and access management risks.</p>
<p>
	11. The ability to manage access in the Internet of Things (IoT) is a concern.</p>
<p>
	12. Effective identity governance and access management across the enterprise is achievable.</p>
<p>
	<a href="http://www.microfocus.com/ponemon2016">We hope you will read our latest report on this topic.</a></p>
<p>
	Sincerely,</p>
<p>
	Dr. Larry Ponemon&emsp;<br />
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Ponemon Institute and Cloudera announce a webinar on the state of cybersecurity big data analytics on October 11 at 10 AM PT/1 PM ET.]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/ponemon-institute-and-cloudera-announce-a-webinar-on-the-state-of-cybersecurity-big-data-analytics-on-october-11-at-10-am-pt-2-p</link>
      <description><![CDATA[<p>
	Ponemon Institute and Cloudera announce a webinar on the state of cybersecurity big data analytics on October 11 at 10 AM PT/1 PM ET.</p>
<p>
	By Dr. Larry Ponemon</p>
<p>
	<br />
	Big Data Cybersecurity Analytics, conducted by Ponemon Institute and sponsored by Cloudera, provides more evidence that the use of big data analytics is very important to ensuring a strong cybersecurity posture. Dr. Larry Ponemon and Rocky DeStefano, Cloudera&rsquo;s cybersecurity subject matter expert, will participate in a webinar on October 11 to discuss key findings from the research.</p>
<p>
	Following are key findings from the research.</p>
<p>
	&bull; Organizations are 2.25X more likely to identify a security incident within hours or minutes when they are a heavy user of big data cybersecurity analytics.</p>
<p>
	&bull; Eighty-one percent of respondents say demand for big data for cybersecurity analytics has significantly increased over the past 12 months.</p>
<p>
	&bull; Heavy users of big data analytics have a higher level of confidence in their ability to detect cyber incidents than light users.&nbsp;&nbsp; With respect to 11 common cyber threats, the biggest gaps between heavy and light users concern the organization&rsquo;s ability to detect advanced malware/ransomware, compromised devices (e.g., credential theft), zero day attacks and malicious insiders.&nbsp; The smallest gaps in detection between heavy and light users concern denial of services, web-based attacks and spear phishing/social engineering.</p>
<p>
	&bull; Companies represented in this research are allocating an average of $14.50 million to IT security in fiscal year 2016 and an average of $2.32 million (16 percent) of this budget is allocated to analytics tools.</p>
<p>
	We hope you will join us for a unique perspective on the state of big data cybersecurity analytics.</p>
<p>
	<a href="https://www.cloudera.com/about-cloudera/events/webinars/cybersecurity-state-of-the-union-series.html?src=web">Register here. </a>&emsp;<br />
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[SMBs are vulnerable to cyber attacks ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/smbs-are-vulnerable-to-cyber-attacks</link>
      <description><![CDATA[<p>
	We are pleased to announce the release of a <a href="https://signup.keepersecurity.com/state-of-smb-cybersecurity-report/">study</a> focused on the cybersecurity threat to small and medium-sized companies (SMBs). Based on the findings, we conclude that no business is too small to evade a cyber attack or data breach. In fact, 55 percent of respondents say they experienced a cyber attack in the past 12 months and 50 percent of companies represented in this study had a data breach during the past year.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Throughout the world, MSSPs are improving security posture and fighting cyber threats]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/throughout-the-world-mssps-are-improving-security-posture-and-fighting-cyber-threats</link>
      <description><![CDATA[<p>
	We are pleased to announce the release of our first study dedicated to the topic of managed security services providers (MSSPs), sponsored by Raytheon. A key finding of the study is that companies using MSSPs understand the primary benefits of leveraging external expertise. MSSPs are gaining in popularity by providing such services as security information and event management (SIEM), network security management (NSM), endpoint detection and response (EDR), incident response, forensics, proactive threat hunting and more.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Why Companies Need BCM Before They Have a Data Breach]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/why-companies-need-bcm-before-they-have-a-data-breach</link>
      <description><![CDATA[<p>
	By Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute</p>
<p>
	We are pleased to announce the release of the <a href="http://www-935.ibm.com/services/us/en/it-services/business-continuity/impact-of-business-continuity-management/index.html">2016 Cost of Data Breach Study: The Impact of Business Continuity Management (BCM)</a>, in partnership with IBM.&nbsp; This year we studied how organizations are using BCM in 12 different countries, 383 companies across 16 industries.<br />
	<br />
	According to the research, BCM programs can reduce the per capita cost of data breach, the mean time to identify and contain a data breach and the likelihood of experiencing such an incident over the next two years.&nbsp;</p>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Nearly 90 Percent of Healthcare Organizations Suffer Data Breaches, New Ponemon Study Shows]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/sixth-annual-benchmark-study-on-privacy-security-of-healthcare-data</link>
      <description><![CDATA[<p>
	Nearly 90 Percent of Healthcare Organizations Suffer Data Breaches, New Ponemon Study Shows</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[New Ponemon Study on Malware Detection & Prevention Released]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/new-ponemon-study-on-malware-detection-prevention-released</link>
      <description><![CDATA[<p>
	<br />
	<em>The State of Malware Detection &amp; Prevention</em> sponsored by Cyphort reveals the difficulty of preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks.&nbsp;</p>
<p>
	<a href="http://go.cyphort.com/Ponemon-Report-Page.html">http://go.cyphort.com/Ponemon-Report-Page.html</a></p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Healthcare organizations are in the cross hairs of cyber attackers]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/healthcare-organizations-are-in-the-cross-hairs-of-cyber-attackers</link>
      <description><![CDATA[<p>
	<em><a href="http://business.eset.com/cybersecurity-healthcare-survey/">The State of Cybersecurity in Healthcare Organizations in 2016</a></em>, sponsored by ESET, found that on average, healthcare organizations represented in this study have experienced almost one cyber attack per month over the past 12 months. Almost half (48 percent) of respondents say their organizations have experienced an incident involving the loss or exposure of patient information during this same period, but 26 percent of respondents are unsure.&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/the-second-annual-study-on-exchanging-cyber-threat-intelligence-there-has-to-be-a-better-way</link>
      <description><![CDATA[<p>
	We are pleased to let you know about our latest study on intelligence sharing.<em> The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way </em>reveals interesting trends in how organizations are participating in initiatives or programs for exchanging threat intelligence with peers, industry groups, IT vendors and government. According to the 692 IT and IT security practitioners surveyed, there is more recognition that the exchange of threat intelligence can improve an organization&rsquo;s security posture and situational awareness. However, concerns about trust in the sources of intelligence and timeliness of the information continue to be a deterrent to participation in such initiatives.</p>
<p>
	Forty-seven percent of respondents say their organization had a material security breach that involved an attack that compromised the networks or enterprise systems. This attack could have been external (i.e. hacker), internal (i.e. malicious insider) or both. Most respondents (65 percent) say threat intelligence could have prevented or minimized the consequences of the attack.</p>
<p>
	<strong>Following are key research takeaways:</strong></p>
<p>
	<strong>Threat intelligence is essential for a strong security posture.</strong> Seventy-five percent of respondents, who are familiar and involved in their company&rsquo;s cyber threat intelligence activities or process, believe gathering and using threat intelligence is essential to a strong security posture.</p>
<p>
	<strong>Potential liability and lack of trust in sources of intelligence, keep some organizations from participating</strong>. Organizations that only partially participate cite potential liability of sharing (62 percent of respondents) and lack of trust in the sources of intelligence (60 percent of respondents). However, more respondents believe there is a benefit to exchanging threat intelligence.</p>
<p>
	<strong>Organizations rely upon peers and security vendors for threat intelligence. </strong>Sixty-five percent of respondents say they engage in informal peer-to-peer exchange of information or through a vendor threat exchange service (45 percent of respondents). IT vendors and peers are also considered to provide the most actionable information. Law enforcement or government officials are not often used as a source for threat intelligence.</p>
<p>
	<strong>Threat intelligence needs to be timely and easy to prioritize. </strong>Sixty-six percent of respondents who are only somewhat or not satisfied with current approaches say it is because the information is not timely and 46 percent complain the information is not categorized according to threat type or attacker.</p>
<p>
	<strong>Organizations are moving to a centralized program controlled by a dedicated team. &nbsp;</strong>A huge barrier to effective collaboration in the exchange of threat intelligence is the existence of silos. Centralizing control over the exchange of threat intelligence is becoming more prevalent and might address the silo problem.</p>
<p>
	We hope you will <a href="http://internetidentity.com">download the full report</a>.</p>
<p>
	Warmest regards,</p>
<p>
	&nbsp;Dr. Larry Ponemon</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Advanced Threat Detection with Machine-Generated Intelligence]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/advanced-threat-detection-with-machine-generated-intelligence</link>
      <description><![CDATA[<p>
	Companies are losing traction in the fight to identify and prevent advanced persistent threats (APTs) mainly because threat intelligence is often inaccurate or incomplete. The IT security practitioners in our latest study, Advanced Threat Detection with Machine-Generated Intelligence, believe better intelligence could have stopped an average of five security breaches their company had in the past two years. The good news is machine-generated intelligence provided by near-real-time technologies can improve threat detection and the ability to determine baseline or &ldquo;normal behavior&rdquo; in order to detect abnormal behavior.&nbsp; According to participants in our research, machine-generated intelligence solutions will make threat intelligence more actionable and useful.&nbsp; We hope you will read our latest study sponsored by Prelert, <a href="http://info.prelert.com/advanced-threat-detection-with-machine-generated-intelligence"><em>Advanced Threat Detection with Machine-Generated Intelligence</em></a>, which looks at the state of advanced threat detection in companies, technologies deployed to detect advanced threats and the value of machine-generated intelligence.<br />
	<br />
	Warmest regards,</p>
<p>
	Dr. Larry Ponemon<br />
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[What You Don’t Know Will Hurt You: A Study of the Risk from Application Access and Usage]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/what-you-don-t-know-will-hurt-you-a-study-of-the-risk-from-application-access-and-usage</link>
      <description><![CDATA[<p>
	<br />
	Companies and their employees are becoming increasingly dependent upon applications to achieve business goals and increase productivity. However, the proliferation of applications is creating a serious security risk because identifying users&rsquo; risky behavior and non-compliance with policies can be nearly impossible. The typical organization now collects and stores a vast amount of customer data. In addition, the large number of employees accessing applications makes it difficult for organizations to keep track of exactly &ldquo;who&rsquo;s doing what&rdquo;.&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[What Erodes Trust in Digital Brands?]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/what-erodes-trust-in-digital-brands</link>
      <description><![CDATA[<p>
	What Erodes Trust in Digital Brands?</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Around the world, IT security practitioners face a common problem: a budget that is inadequate to deal with cyber threats]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/around-the-world-it-security-practitioners-face-a-common-problem-a-budget-that-is-inadequate-to-deal-with-cyber-threats</link>
      <description><![CDATA[<p>
	Around the world, IT security practitioners face a common problem: a budget that is inadequate to deal with cyber threats</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Ponemon Institute Releases New Study on the Efforts of Retail Companies and Financial Services to Improve the Time to Detect and Contain Advanced Threats]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/ponemon-institute-releases-new-study-on-the-efforts-of-retail-companies-and-financial-services-to-improve-the-time-to-detect-and</link>
      <description><![CDATA[<p>
	Ponemon Institute Releases New Study on the Efforts of Retail Companies and Financial Services to Improve the Time to Detect and Contain Advanced Threats</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Cost of Data Breach Grows as does Frequency of Attacks ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/cost-of-data-breach-grows-as-does-frequency-of-attacks</link>
      <description><![CDATA[<p>
	Cost of Data Breach Grows as does Frequency of Attacks&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Criminal Attacks: The New Leading Cause of Data Breach in Healthcare ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/criminal-attacks-the-new-leading-cause-of-data-breach-in-healthcare</link>
      <description><![CDATA[<p>
	The <a href="https://www2.idexpertscorp.com/fifth-annual-ponemon-study-on-privacy-security-incidents-of-healthcare-data"><em>Fifth Annual Benchmark Study on Privacy &amp; Security of Healthcare Data,</em></a> sponsored by ID Experts, shows that, for the first time, criminal attacks are the number-one root cause of healthcare data breaches.&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[New Ponemon Institute study released: Economic Impact of Mixed Content Warnings on Consumer Behavior]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/new-ponemon-institute-study-released-economic-impact-of-mixed-content-warnings-on-consumer-behavior</link>
      <description><![CDATA[<p>
	We have all encountered mixed content warnings that show a visual icon or pop-up that attempts to warn us while visiting a website. A new study by Ponemon Institute, sponsored by Ghostery, recently conducted an experimental study to test consumer reactions to mixed content warnings when browsing secure e-commerce sites. To cut to the chase, the study reveals that consumer attrition resulting from mixed content warnings on web pages is estimated to cost the top 100 Internet retailers in the United States $310 million per annum. We hope you will read the details in the entire report.<br />
	<br />
	<a href="http://marketing.ghosterymktg.com/acton/fs/blocks/showLandingPage/a/4197/p/p-00b4/t/page/fm/0">http://marketing.ghosterymktg.com</a></p>
<p>
	Warmest regards,<br />
	Dr. Larry Ponemon<br />
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[A Few Challenges in Calculating Total Cost of a Data Breach Using Insurance Claims Payment Data]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/a-few-challenges-in-calculating-total-cost-of-a-data-breach-using-insurance-claims-payment-data</link>
      <description><![CDATA[<p>
	Let me first state that I am a big fan of the Verizon DBIR and have read every one. I also have a great deal of respect for the NetDiligence Cyber Claims Study and like many in the insurance industry, find it extremely valuable. I was, however, taken by surprise when I read the latest Verizon report and saw that their cost of a data breach analysis was based on the NetDiligence data set. Here&rsquo;s why:</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Why Ponemon Institute’s Cost of Data Breach Methodology Is Sound and Endures ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/why-ponemon-institute-s-cost-of-data-breach-methodology-is-sound-and-endures</link>
      <description><![CDATA[<p>
	This week, Verizon released its annual 2015 Data Breach Investigations Report. We respect the amount of effort and resources Verizon devotes to its annual report. In the past, Ponemon Institute has reached out to the researchers at Verizon because of what I believe should be a shared and collaborative goal to continuously improve and refine the research being conducted about data breaches and other security incidents. In fact, we were pleased to have Wade Baker from the Verizon DBIR team speak to our Institute&rsquo;s RIM Council of sponsoring companies and Fellows in December 2012. By the way, Verizon is a sponsoring company of the Institute.</p>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Ponemon Institute releases new study on how organizations can leapfrog to a stronger cyber security posture]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/ponemon-institute-releases-new-study-on-how-organizations-can-leapfrog-to-a-stronger-cyber-security-posture</link>
      <description><![CDATA[<p>
	Is your company&rsquo;s security strategy stuck in a rut? Are you concerned that the competition is outpacing you in its ability to deal with increasingly sophisticated and stealthy cyber criminals. Ponemon Institute with sponsorship from Accenture spent several months interviewing senior level IT and IT security practitioners in 247 companies to identify the main factors that contribute to an organization&rsquo;s improved security posture&mdash;or leapfrogging from a level of low to high performance in its security ecosystem.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[2014: A Year of Mega Breaches]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/2014-a-year-of-mega-breaches-1</link>
      <description><![CDATA[<p>
	2014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013 and ending with Sony Pictures Entertainment. In the <em><a href="http://www.identityfinder.com/us/Downloads/InformationRequest?content=http://www.identityfinder.com/us/Files/2014TheYearOfTheMegaBreach.pdf">2014: A Year of Mega Breaches</a></em> study sponsored by Identity Finder, the following findings reveal changes companies are making to their security strategies.</p>
<p>
	&bull; More resources are allocated to preventing, detecting and resolving data breaches. According to 61 percent of respondents, the budget for security increased by an average of 34 percent. Most was used for SIEM, endpoint security and intrusion detection and prevention.</p>
<p>
	&bull; Senior management gets a wake up call and realizes the need for a stronger cyber defense posture. Sixty-seven percent of respondents say their organization made sure the IT function has the budget necessary to defend it from data breaches.</p>
<p>
	&bull; Operations and compliance processes are changing to prevent and detect breaches. Sixty percent of respondents say they made changes to operations and compliance processes to establish incident response teams, conduct training and awareness programs and use data security effectiveness measures.</p>
<p>
	We hope you will read the full <a href="http://www.identityfinder.com/us/Downloads/InformationRequest?content=http://www.identityfinder.com/us/Files/2014TheYearOfTheMegaBreach.pdf">report</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Ponemon Institute Announces Results of 2014 Most Trusted Companies for Privacy Study]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/ponemon-institute-announces-results-of-2014-most-trusted-companies-for-privacy-study</link>
      <description><![CDATA[<p>
	In recognition of Data Privacy Day, Ponemon Institute is pleased to announce the results of the 2014 Most Trusted Companies for Privacy Study, an annual study that tracks consumers&rsquo; rankings of organizations that collect and manage their personal information. This year, the most trusted company is Amazon.&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/the-open-source-collaboration-study-viewpoints-on-security-privacy-in-the-us-emea-1</link>
      <description><![CDATA[<p>
	Ponemon Institute is pleased to present the Open Source Collaboration Study conducted in the US &amp; EMEA.&nbsp;The study found that overall, IT professionals&#39; perceptions of commercial open source software for messaging and collaboration are more positive than their perceptions of proprietary software. Common to both the US and EMEA, is IT professionals&#39; dissatisfaction with their current messaging and collaboration platforms, the majority of which are proprietary solutions. And, while IT professionals in the US and EMEA disagree on the relative importance of security versus privacy, there is agreement among IT professionals that commercial open source software offers better cost, control, quality and business continuity than proprietary software. To learn more about this research sponsored by Zimbra, please download the <a href="http://info.zimbra.com/webinar-ponemon-on-privacy-open-source-and-the-future-of-messaging">webinar</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Corporate Data: A Protected Asset or a Ticking Time Bomb? ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/corporate-data-a-protected-asset-or-a-ticking-time-bomb</link>
      <description><![CDATA[<p>
	In the pressure to be productive, many employees are putting confidential corporate information at risk. Is it possible to have both a productive workforce and a strong security posture? Our latest study, <em>Corporate Data: A Protected Asset or a Ticking Time Bomb?</em> discusses the dilemma facing IT practitioners charged with stopping data leakage and offers solutions on how to keep critical business information secure without diminishing the productivity of employees. We hope you will read the full <a href="http://www.varonis.com/research/why-are-data-breaches-happening/">report</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Can a data breach in the cloud result in a larger and more costly incident? ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/can-a-data-breach-in-the-cloud-result-in-a-larger-and-more-costly-incident</link>
      <description><![CDATA[<p>
	Can a data breach in the cloud result in a larger and more costly incident? Our latest study,<br />
	Data Breach: The Cloud Multiplier Effect sponsored by Netskope reveals how the risk of a data breach in the cloud is multiplying. According to the IT and IT security practitioners participating in this study, the proliferation of mobile and other devices with access to cloud resources and more dependency on cloud services without the support of a strengthened cloud security posture and visibility of end user practices is making it difficult to stop the loss or theft of sensitive data in the cloud. We hope you will download the complete report at:<br />
	<a href="http://www.netskope.com/reports-infographics/ponemon-2014-data-breach-cloud-multiplier-effect/">http://www.netskope.com/reports-infographics/ponemon-2014-data-breach-cloud-multiplier-effect/</a></p>
<p>
	To register for the webinar featuring Dr. Larry Ponemon and Netskope Founder and CEO, Sanjay Beri, on July 16 at 1 PM EST, please click here:<br />
	<a href="http://www.netskope.com/webinar-data-breach-cloud-multiplier-effect/">http://www.netskope.com/webinar-data-breach-cloud-multiplier-effect/</a></p>
<p>
	Warmest regards,<br />
	<br />
	Dr. Larry Ponemon</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Ponemon Institute and Raytheon Release New Study on the Insider Threat]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/ponemon-institute-and-raytheon-release-new-study-on-the-insider-threat</link>
      <description><![CDATA[<p>
	Well-publicized disclosures of highly sensitive information by wiki leaks and former NSA employee Edward Snowden have drawn attention and concern about the insider threat caused by privileged users. We originally conducted a study on this topic in 2011 and decided it was time to see if the risk of privileged user abuse has increased, decreased or stayed the same.&nbsp; Unfortunately companies have not made much progress in stopping this threat since then. Our latest study commissioned by Raytheon, &ldquo;Privileged User Abuse &amp; The Insider Threat,&rdquo; looks at what companies are doing right and the vulnerabilities that need to be addressed with policies and technologies. One area that is a big problem is the difficulty in actually knowing if an action taken by an insider is truly a threat. Sixty-nine percent of respondents say they don&rsquo;t have enough contextual information from security tools to make this assessment and 56 percent say security tools yield too many false positive. To learn more, we hope you will read the full report:<br />
	<a href="http://www2.trustedcs.com/Raytheon-PonemonSurveyResearchReport">http://www2.trustedcs.com/Raytheon-PonemonSurveyResearchReport</a></p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Ponemon Institute Releases 2014 Cost of Data Breach: Global Analysis]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis</link>
      <description><![CDATA[<p>
	Throughout the world, companies are finding that data breaches have become as common as a cold but far more expensive to treat. With the exception of Germany, companies had to spend more on their investigations, notification and response when their sensitive and confidential information was lost or stolen. As revealed in the 2014 Cost of Data Breach Study: Global Analysis, sponsored by IBM, the average cost to a company was $3.5 million in US dollars and 15 percent more than what it cost last year.</p>
<p>
	Will these costs continue to escalate? Are there preventive measures and controls that will make a company more resilient and effective in reducing the costs? Nine years of research about data breaches has made us smarter about solutions.</p>
<p>
	Critical to controlling costs is keeping customers from leaving. The research reveals that reputation and the loss of customer loyalty does the most damage to the bottom line. In the aftermath of a breach, companies find they must spend heavily to regain their brand image and acquire new customers. Our report also shows that certain industries, such as pharmaceutical companies, financial services and healthcare, experience a high customer turnover. In the aftermath of a data breach, these companies need to be especially focused on the concerns of their customers.</p>
<p>
	As a preventive measure, companies should consider having an incident response and crisis management plan in place. Efficient response to the breach and containment of the damage has been shown to reduce the cost of breach significantly. Other measures include having a CISO in charge and involving the company&rsquo;s business continuity management team in dealing with the breach.</p>
<p>
	In most countries, the primary root cause of the data breach is a malicious insider or criminal attack. It is also the most costly. In this year&rsquo;s study, we asked companies represented in this research what worries them most about security incidents, what investments they are making in security and the existence of a security strategy.</p>
<p>
	An interesting finding is the important role cyber insurance can play in not only managing the risk of a data breach but in improving the security posture of the company. While it has been suggested that having insurance encourages companies to slack off on security, our research suggests the opposite. Those companies with good security practices are more likely to purchase insurance.</p>
<p>
	Global companies also are worried about malicious code and sustained probes, which have increased more than other threats. Companies estimate that they will be dealing with an average of 17 malicious codes each month and 12 sustained probes each month. Unauthorized access incidents have mainly stayed the same and companies estimate they will be dealing with an average of 10 such incidents each month.</p>
<p>
	When asked about the level of investment in their organizations&rsquo; security strategy and mission, on average respondents would like to see it doubled from what they think will be spent&mdash;an average of $7 million to what they would like to spend&mdash;an average of $14 million. This may be a tough sell in many companies. However, our cost of data breach research can help IT security executives make the case that a strong security posture can result in a financially stronger company.<br />
	<br />
	To download the complete report please use the following link:</p>
<p>
	<a href="http://www-935.ibm.com/services/us/en/it-services/security-services/cost-of-data-breach/">www.ibm.com/services/costofbreach</a><br />
	&nbsp;</p>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Unlocking the Mobile Security Potential: The Key to Effective Two-Factor Authentication]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/unlocking-the-mobile-security-potential-the-key-to-effective-two-factor-authentication</link>
      <description><![CDATA[<p>
	An important security issue for many companies is the authentication of users using mobile devices for transactions. <a href="http://www.tyntec.com/resources/whitepapers/two-factor-authentication-effective-one-time-passwords-otps.html"><em>Unlocking the Mobile Security Potential: The Key to Effective Two-Factor Authentication</em></a> sponsored by tyntec and conducted by Ponemon Institute provides insights into mobile authentication in four global regions: North America (NA), Europe, Middle East and Africa (EMEA), Asia-Pacific plus Japan (APJ) and Latin America plus Mexico (LATAM).</p>
<p>
	The study has interesting findings about the state of mobile authentication and the preferences of companies. Specifically, for security purposes, location and validation of the number in real-time is considered valuable. They believe this would strengthen their security measures assuming opt-in by end-user. Furthermore, in the coming year most of the respondents say they are considering planning to extend the use of SMS-based two-factor authentication for user registration or identity verification or activation of online services. To download the entire report, please use this <a href="http://www.tyntec.com/resources/whitepapers/two-factor-authentication-effective-one-time-passwords-otps.html">link</a>.</p>
<p>
	Warmest regards,</p>
<p>
	Dr. Larry Ponemon<br />
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Fourth Annual Benchmark Study on Patient Privacy and Data Security]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/fourth-annual-benchmark-study-on-patient-privacy-and-data-security</link>
      <description><![CDATA[<p>
	Today we are releasing our <a href="http://www2.idexpertscorp.com/ponemon-report-on-patient-privacy-data-security-incidents/"><em>Fourth Annual Benchmark Study on Patient Privacy and Data Security</em></a><em>. </em>We hope you will read the report sponsored by ID Experts that reveals some fascinating trends. Specifically, criminal attacks on healthcare systems have risen a startling 100 percent since we first conducted the study in 2010. This year, we found the number and size of data breaches has declined somewhat. Employee negligence is a major risk and is being fueled by BYOD. Giving healthcare organizations major headaches are: risks to patient data caused by the Affordable Care Act, exchange of patient health information with Accountable Care Organizations and lack of trust in business associates privacy and security practices. For a copy of the <a href="http://www2.idexpertscorp.com/ponemon-report-on-patient-privacy-data-security-incidents/"><em>Fourth Annual Benchmark Study on Patient Privacy and Data Security</em></a>, visit <a href="http://www2.idexpertscorp.com/ponemon">www2.idexpertscorp.com/ponemon</a>.&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Thales e-Security and Ponemon Institute collaborate to produce 2013 Global Encryption Trends Study]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/thales-e-security-and-ponemon-collaborate-to-produce-2013-global-encryption-trends-study</link>
      <description><![CDATA[<p>
	This past February, Thales e-Security released the publication of its latest <a href="https://www.thales-esecurity.com/knowledge-base/analyst-reports/global-encryption-trends-study">2013 Global Encryption Trends Study</a>. The report, based on independent research by the Ponemon Institute and sponsored by Thales, reveals that use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in executing data encryption policy.<br />
	The survey indicated that only 14% of organizations surveyed do not have any encryption strategy compared with 22% last year. The study also shows that there has been a steady increase in the deployment of encryption solutions used by organizations over the past nine years, with 35% of organizations now having an encryption strategy applied consistently across the entire enterprise compared with 29% last year.&nbsp;<br />
	&ldquo;Encryption usage continues to be a clear indicator of a strong security posture but there appears to be emerging evidence that concerns over key management are becoming a barrier to its more widespread adoption. For the first time in this study we drilled down into the issue of key management and found it emerging as a huge operational challenge. But questions are and should be asked about the broader topics of policy issues and choice of encryption algorithms &ndash; especially in the light of recent concerns over back doors, poorly implemented crypto systems and weak key management systems.&rdquo;<br />
	- Dr. Larry Ponemon, chairman and founder of The Ponemon Institute</p>
<p>
	&ldquo;Whilst key management may be emerging as a barrier to encryption deployment, it is not a new issue. The challenges associated with key management have already been addressed in heavily regulated industries such as payments processing, where best practices are well proven and could translate easily to a variety of other verticals. With more than 40 years&rsquo; experience providing key management solutions. Thales is ideally positioned to help organizations re-assess and re-evaluate their crypto security and key management infrastructure and deliver solutions that ensure their integrity and trustworthiness.&rdquo;<br />
	-Richard Moulds, vice president strategy at Thales e-Security</p>
<p>
	Download your copy of the new 2013 Global Encryption Trends Study today.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/threat-intelligence-incident-response-a-study-of-u-s-emea-organizations</link>
      <description><![CDATA[<p>
	What does a security team tell the CEO and board when a cyber attacker robs the company&rsquo;s IP or shuts down the networks? CISOs face job insecurity because of the difficulty in being able to gather the threat intelligence quickly enough to know the &ldquo;who,&rdquo; &ldquo;what,&rdquo; &ldquo;where,&rdquo; &ldquo;how&rdquo; and &ldquo;why&rdquo; to respond and resolve an attack. The study reveals that many reports to senior management about a cyber attack are modified, filtered or watered down because the CISO does not have accurate and actionable threat intelligence.&nbsp; What needs to be done? The consensus among the IT security practitioners surveyed is that they need the time and tools to discover and understand the nature of attacks faster with greater precision. To learn more about the current state of cyber attack responsiveness, we hope you will read <em>Threat Intelligence &amp; Incident Response: A Study of U.S. &amp; EMEA Organizations</em> sponsored by AccessData. For a copy of the full report, please click <a href="http://marketing.accessdata.com/acton/form/4390/021a:d-0001/0/index.htm">here</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[The Impact of IT Transformation on Enterprise Computing]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/the-impact-of-it-transformation-on-enterprise-computing</link>
      <description><![CDATA[<p>
	We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by the Logicalis Corporation and HP.&nbsp; The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges to advancing through each stage and how successful progression can improve an organization&rsquo;s IT effectiveness, including IT security. (<a href="http://www.us.logicalis.com/transform/">Click to download study</a>)</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber Security Incident Response: Are We as Prepared as We Think?]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/cyber-security-incident-response-are-we-as-prepared-as-we-think</link>
      <description><![CDATA[<p>
	Why is the CEO the last to know if the company had a cyber attack? According to the IT experts in our latest study, only 20 percent say they have regular communication with their senior leadership about threats and only 14 percent say the C-suite takes part in incident response. We hope you will read our latest study, <em>Cyber Security Incident Response: Are We as Prepared as We Think?</em> Sponsored by Lancope, IT experts share their insights about the state of incident response. The report can be found at:&nbsp;<a href="http://www.lancope.com/ponemon-incident-response/">http://www.lancope.com/ponemon-incident-response/</a></p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[2013 Survey on Medical Identity Theft]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/2013-survey-on-medical-identity-theft</link>
      <description><![CDATA[<p>
	We are pleased to announce the release of our <em>2013 Survey on Medical Identity Theft</em>. This is the fourth year of the study and as in previous years we find that medical identity theft continues to be a costly and potentially life-threatening crime. However, unlike other forms of identity theft, the thief is most likely to be someone the victim knows very well. In this study of more than 700 victims of this fraud, most cases of identity theft result not from a data breach but from the sharing of personal identification credentials with family and friends. Or, family members take the victim&rsquo;s credentials without permission.</p>
<p>
	<br />
	We believe that individuals, healthcare organizations and government working together can reduce the risk of medical identity theft. First, individuals need to be aware of the negative consequences of sharing their credentials despite possible good intentions. They should also take the time to read their medical records and explanation of benefits statements to ensure that their information is correct. Second, healthcare organizations and government should improve their authentication procedures to prevent imposters from obtaining medical services and products.<br />
	Sponsored by the Medical Identity Fraud Alliance (MIFA), with support from ID Experts, the report can be found at <a href="http://medidfraud.org/2013-survey-on-medical-identity-theft">http://medidfraud.org/2013-survey-on-medical-identity-theft</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Live Threat Intelligence Impact Report 2013]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/live-threat-intelligence-impact-report-2013-1</link>
      <description><![CDATA[<p>
	Slow and weak threat intelligence can keep companies from defending against security compromises, breaches and exploits. According to the findings, if actionable intelligence about cyber attacks is available within 60 seconds before a compromise, the average cost of an exploit could be reduced an average of 40 percent. To learn more about the value of immediate threat intelligence, the current state of threat intelligence and the propensity of organizations to invest in live intelligence solutions, please listen to a webcast featuring Dr. Larry Ponemon and Jeff Harrell of Norse discussing the highlights of the research study, <em>Live Threat Intelligence Impact Report 2013</em>. To listen to the webinar and download a copy of the study, <a href="http://www.norse-corp.com/ponemon.html">click here</a>.&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/managing-cyber-security-as-a-business-risk-cyber-insurance-in-the-digital-age</link>
      <description><![CDATA[<p>
	We are pleased to announce the release of a new study, <em>Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age</em>. With the increasing cost and volume of data breaches, cyber security is quickly moving from being considered by business leaders as a purely technical issue to a larger business risk. This shift has spurred increased interest in cyber insurance to mitigate the cost of these issues. For the full report, <a href="http://www.experian.com/innovation/business-resources/ponemon-study-managing-cyber-security-as-business-risk.jsp?ecd_dbres_cyber_insurance_study_ponemon_referral">please click here.</a></p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Live Threat Intelligence Impact Report 2013]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/live-threat-intelligence-impact-report-2013</link>
      <description><![CDATA[<p>
	We are pleased to announce the release of a new study,<em> Live Threat Intelligence Impact Report 2013</em>, that reveals the facts behind the impact that weak intelligence can have on organizations and why the ability to quickly gather, analyze and use actionable intelligence is essential to cyber defense. According to the study sponsored by Norse, the companies that seem to be most successful in thwarting compromises to networks and enterprise systems say the optimal age of actionable intelligence is no longer than 4.6 minutes. To learn more about the value of immediate and live intelligence, we hope you will read the full report. <a href="http://pages.ipvenger.com/PonemonImpactReport_LP.html">To access click here</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[The Risk of Regulated Data on Mobile Devices & in the Cloud]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/the-risk-of-regulated-data-on-mobile-devices-in-the-cloud</link>
      <description><![CDATA[<p>
	We are pleased to announce the release of a new Ponemon Institute study sponsored by WatchDox. If you ever worry about an employee downloading confidential, regulated data on their own personal mobile device you need to read our report. <a href="http://info.watchdox.com/WPRegLandingPages_PonemonRiskofRegulatedData.html">To obtain a copy click here</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[The State of Risk Based Security Management]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/the-state-of-risk-based-security-management</link>
      <description><![CDATA[<p>
	&nbsp;</p>
<div>
	<div>
		<span id="OLK_SRC_BODY_SECTION">Ponemon Institute and Tripwire continue to study the state of risk-based security management. This annual study is conducted to understand the level of maturity of RBSM. In this year&#39;s study, we are especially interested in understanding the communication barriers that may be hindering companies ability to advance to more robust programs. One question that focuses on these barriers is whether RBSM an art or a science. To find out what our survey respondents think click here. Access the research: <a href="http://www.tripwire.com/ponemon/2013/">The Second Annual Study on the State of Risk-based Security Management</a></span></div>
</div>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Security of Cloud Computing Users 2013 Study ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/new-security-of-cloud-computing-users-2013-study-confirms-conflicting-views-on-cloud-security-responsibility</link>
      <description><![CDATA[<p>
	&nbsp;</p>
<p style="text-align: left; ">
	Today we are releasing a very interesting follow up study on how organizations are improving--or not--their cloud security practices. The Security of Cloud Computing Users study shows that when it comes to cloud computing the glass may be half full or half empty because only half or less of respondents have positive perceptions about how their organizations are adopting cloud security best practices and creating confidence in cloud services used within their organization. A significant finding is that only 50 percent of respondents are engaging their security team (always or most of the time) in determining the use of cloud services. We hope you will read the complete report to learn about changes in cloud computing security.&nbsp;Access the full Ponemon Research: <a href="https://www.ca.com/us/collateral/industry-analyst-reports/na/ponemon-institute-security-of-cloud-computing-users-study-2013.aspx">2013 Security of Cloud Computing Users Study</a><br />
	<a href="https://www.ca.com/us/collateral/industry-analyst-reports/na/ponemon-institute-security-of-cloud-computing-users-study-2013.aspx">Highlights: View key takeaways in this infographic</a></p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Risk of Insider Fraud: Second Annual Study]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/risk-of-insider-fraud-second-annual-study</link>
      <description><![CDATA[<p>
	Today we released a new study entitled the <em>Risk of Insider Fraud: Second Annual Study</em> . The research reveals that the number of employee-related incidents of fraud continues to remain high. However, only 44 percent of IT and IT security practitioners say their organization views the prevention of insider fraud as a top security priority and this perception has declined since we first conducted this study in 2011. Contributing to the insider risk is BYOD, employee access of enterprise systems from remote locations and lack of security protocols over edge devices. Some suggestions to address these risks include making training and awareness an important component of a security initiative and monitoring access privileges. These privileges also need to be appropriate for the employees&rsquo; role and responsibility. We hope you will read the full report that discusses the challenges organizations face in minimizing the risk of the malicious and negligent insider. To find out more, visit <a href="http://www.attachmate.com/assets/Ponemon_2012_Report.pdf">http://www.attachmate.com/assets/Ponemon_2012_Report.pdf</a></p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[The Post Breach Boom]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/the-post-breach-boom</link>
      <description><![CDATA[<p>
	Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, we conducted The Post Breach Boom study to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensics activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach. To download the report, please click <a href="/local/upload/file/Post%20Breach%20Boom%20V7.pdf">here</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Efficacy of Emerging Network Security Technologies ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/efficacy-of-emerging-network-security-technologies</link>
      <description><![CDATA[<p>
	&nbsp;</p>
<p>
	One of our latest studies is the <em>Efficacy of Emerging Network Security Technologies</em> our objective is to learn about organizations&rsquo; use and perceptions about emerging network security technologies and their ability to address serious security threats. &nbsp;The emerging technologies examined in this study include next generation firewalls, intrusion prevention systems with reputation feeds and web application firewalls. Some interesting findings include:&nbsp;&nbsp;Securing web traffic is by far the most significant network security concern for the majority of organizations. However, the majority of respondents say network security technologies fall short of vendors&rsquo; promises. Almost half (48 percent) of respondents agree that emerging network security technologies are not effective in minimizing attacks that aim to bring down web applications or curtail gratuitous Internet traffic. To read a copy of the report please click <a href="http://www.juniper.net/us/en/dm/spotlight">http://www.juniper.net/us/en/dm/spotlight</a></p>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Understanding the Methodology and Staggering Costs in the Annual Cost of Failed Trust Report]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/understanding-the-methodology-and-staggering-costs-in-the-annual-cost-of-failed-trust-report</link>
      <description><![CDATA[<p>
	<strong>Some staggering numbers</strong><br />
	<br />
	Every Global 2000 enterprise faces a total exposure of almost U.S. $400 million over 24 months due to new and evolving attacks on failed cryptographic key and digital certificate management. And adjusting for probability established by survey participants, we found every enterprise risks losing $35 million.<br />
	This findings cap our First Annual Cost of Failed Trust Report: Trusts and Attacks, which quantifies, for the first time, the financial impact of impact of new threats and attacks on our ability to control trust.</p>
<p>
	Complete study is available - <a href="http://www.venafi.com/ponemon-institute-first-annual-cost-of-failed-trust-report/?ls=mb&amp;cid=70150000000KIkw">http://www.venafi.com/ponemon-institute-first-annual-cost-of-failed-trust-report/?ls=mb&amp;cid=70150000000KIkw</a></p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[2012 Most Trusted Companies for Privacy]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/2012-most-trusted-companies-for-privacy</link>
      <description><![CDATA[<p>
	Do we still care about privacy? According to our annual study on privacy trust, more and more of us do care. Our biggest privacy concerns are the fear of identity theft and government intrusions into our personal lives.&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Third Annual Patient Privacy & Data Security Study Released]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/third-annual-patient-privacy-data-security-study-released</link>
      <description><![CDATA[<p>
	Could BYOD increase the risks of a healthcare data breach and medical identity theft? The third annual study on Patient Privacy and Data Security reveals the explosion of mobile devices used in healthcare organizations.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[2013 State of the Endpoint]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/2013-state-of-the-endpoint</link>
      <description><![CDATA[<p>
	Sponsored by Lumension, the <em>2013 State of the Endpoint</em> is our third annual study that tracks endpoint risk in organizations, the resources to address the risk and the technologies deployed to manage threats.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Edelman Privacy Risk Index]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/edelman-privacy-risk-index</link>
      <description><![CDATA[<p>
	We are very pleased to introduce the Edelman Privacy Risk Index developed in collaboration with Ponemon Institute.&nbsp; The Index provides a high level risk coefficient specified for various sized business organizations. The Index is derived from Meta analysis of Ponemon research involving more than 6,400 individuals located in 29 countries.&nbsp; Here is the link to the online calculator:&nbsp; <a href="http://www.edelman.com/privacy-risks/">http://www.edelman.com/privacy-risks/</a></p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[2012 Web Session Intelligence & Security Report: Business Logic Abuse Edition sponsored by Silver Tail Systems ]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/2012-web-session-intelligence-security-report-business-logic-abuse-edition-sponsored-by-silver-tail-systems</link>
      <description><![CDATA[<p>
	&nbsp;</p>
<p>
	<br />
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Second Annual Patient Privacy Study Released]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/second-annual-patient-privacy-study-released</link>
      <description><![CDATA[<p>
	Widespread use of mobile devices is putting patient data at risk, according to the latest Ponemon Institute research on healthcare providers&#39; patient privacy practices.While 81 percent of respondents say employees in their healthcare organizations are using mobile devices to collect, store and/or transmit some form of PHI, 49 percent admit their organizations are not doing anything to protect these devices. To download a copy of the report click here:&nbsp; <a href="http://www2.idexpertscorp.com/ponemon-study-2011/" target="_blank">http://www2.idexpertscorp.com/ponemon-study-2011/</a>.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Best Practices in Data Protection Study Released]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/best-practices-in-data-protection-study-released</link>
      <description><![CDATA[<p>
	&nbsp;Sponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this study is important because it provides insights on how organizations can be more successful when investing in and building a data protection program. The study&#39;s findings reveal five success factors in a data protection program:</p>
<ol>
	<li>
		A formal data protection strategy for the organization and metrics to determine if the strategy is effective.</li>
	<li>
		Key metrics from a management console and observation and regular testing of data protection solutions.</li>
	<li>
		Data protection technology features that focus on privileged users, restriction of access and outbound communications are considered critical</li>
	<li>
		Centralized management of the data protection program with such features as actionable information, policy administration, reporting, automatic securing of endpoints and monitoring.</li>
	<li>
		Automated policies for detection and prevention of end-user misuse of information assets.&nbsp;</li>
</ol>
<p>
	To download the complete report click here: &nbsp;&lt;<a href="https://prod.secureforms.mcafee.com/content/verify?docID=3E46E43C-2252-487A-885B-4C5F125DFB60&amp;cid=WB290&amp;aName=DP&amp;src=web&amp;aType=report&amp;region=us">https://prod.secureforms.mcafee.com/content/verify?docID=3E46E43C-2252-487A-885B-4C5F125DFB60&amp;cid=WB290&amp;aName=DP&amp;src=web&amp;aType=report&reg;ion=us</a>&gt;</p>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Second annual cost of cyber crime study is released]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/second-annual-cost-of-cyber-crime-study-is-released</link>
      <description><![CDATA[<p>
	Today we released our <u>Second Annual Cost of Cyber Crime Study</u>. &nbsp;Our findings support other research studies suggesting increases in the frequency, severity and overall cost of cyber attacks on private and public sector organizations. Our study is sponsored by HP ArcSight. &nbsp;I would be very pleased to discuss this year&#39;s findings, framework and research methods. &nbsp;Please feel free to call us directly or send an email to research@ponemon.org to schedule a one-to-one meeting.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Most trusted companies for privacy]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/most-trusted-companies-for-privacy</link>
      <description><![CDATA[<p>
	Ponemon Institute is releasing our annual Most Trusted Companies for Privacy study this coming week. &nbsp;This is the eighth year that we conducted a U.S. national consumer study that determines the organizations believed to be most committed to protecting and securing personal information. &nbsp;Our research also determines the underlying factors that consumers perceive as most important or influential to their trust ratings. &nbsp; For more information, please contact research@ponemon.org.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Ponemon Releases Cloud Service Provider Study]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/ponemon-releases-cloud-service-provider-study</link>
      <description><![CDATA[<p>
	Last week with CA Technologies we issued the results of a study of cloud service providers and their views on cloud security. There has been a lot of interest in this study. Readers have reviewed the results and responded with some very good questions and comments. In a nutshell, people &ndash; including us &ndash; were surprised by the results, which showed that cloud providers didn&rsquo;t put security as the No. 1 concern in providing their services.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Are we taking adequate steps to protect the critical infrastructure?]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/are-we-taking-adequate-steps-to-protect-the-critical-infrastructure</link>
      <description><![CDATA[<p>
	Last week I presented the results of our latest study entitled, &quot;The State of IT Security: A Study of Utilities and Energy Companies.&quot; Sponsored by Q1 Labs, this research revealed that utilities and energy companies in our study are more concerned about preventing downtime that stopping a cyber attack. &nbsp;In addition, a majority of respondents said that compliance with standards such as NERC CIP is not a top priority. &nbsp;Most surprisingly, only 16 percent of respondents believe that their organization&#39;s existing controls are designed to protect against exploits and attacks through the smart grid. &nbsp;For more information about this study, please contact research@ponemon.org.</p>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Cost of a data breach climbs higher]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/cost-of-a-data-breach-climbs-higher</link>
      <description><![CDATA[<p>
	Most privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat immune to data breach news. The idea is that data breach notifications will become so commonplace that customers just won&rsquo;t care anymore.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Listen to a new podcast on the True Cost of Compliance study]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/listen-to-a-new-podcast-on-the-true-cost-of-compliance-study</link>
      <description><![CDATA[<p>
	Dear friends and colleagues,</p>
<p>
	Please listen to a recent podcast on the True Cost of Compliance study completed last month. &nbsp;Martin KcMeay at Network Security Blog did a great job conducting this 30 minute interview.</p>
<p>
	<a href="http://www.mckeay.net/2011/03/02/network-security-podcast-23/" target="_blank">www.mckeay.net/2011/03/02/network-security-podcast-23/</a></p>
<p>
	If you would like a copy of the full report, please visit Tripwire&#39;s website as follows:</p>
<p>
	<a href="http://www.tripwire.com/ponemon-cost-of-compliance/" target="_blank">www.tripwire.com/ponemon-cost-of-compliance/</a></p>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Compliance Like a Club]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/compliance-like-a-club</link>
      <description><![CDATA[<p>
	Have you ever noticed how some organizations wield compliance like a club when marketing their products or services?&nbsp;They remind you of the latest in information security regulations, such as the <a href="http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenforcementifr.html">HITECH Act</a> or <a href="http://www.mass.gov/Eoca/docs/idtheft/201CMR1700reg.pdf">Mass 201 CMR 17</a>, and then menacingly predict doom for those who transgress.&nbsp;If you fail to comply, their messages warn like a cross schoolmarm, the boogey man will flash his regulator badge and lower the boom (unless, of course, you buy the appropriate product or service).</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Poor Privacy Practice is Ailing Healthcare Industry]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/poor-privacy-practice-is-ailing-healthcare-industry</link>
      <description><![CDATA[<p>
	It has been more than six years since the ChoicePoint data breach thrust the issue of privacy protection into the headlines. Since then hundreds of information security failures have been disclosed and the tools and techniques used to keep sensitive information safe have advanced at a healthy pace. Recent incidents in the healthcare industry, however, strongly suggest that best practices have not been universally adopted.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Data Center Outages and Data Management]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/data-center-outages-and-data-management</link>
      <description><![CDATA[<p>
	I hear the collective sound of our friends, colleagues, and other interested parties scratching their heads at the release of the most recent piece of Ponemon Institute research, <i><a href="http://info.emersonnetworkpower.com/content/lna-11q1-adds-ponemon-white-paper">National Survey on Data Center Outages</a></i>.&nbsp;You read that right, data center outages.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Information Governance in the Cloud]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/information-governance-in-the-cloud</link>
      <description><![CDATA[<p>
	Just a brief note to bring our recent webinar to your attention.&nbsp; I presented Information Governance in the Cloud along with the good people at&nbsp;Symantec.&nbsp; The presentation is based in part on results from our earlier report, Flying Blind in the Cloud.</p>
<p>
	If you want to view the webinar, presented on the Windows Live Meeting platform, please <a href="https://www.livemeeting.com/cc/symantec_live/view?id=E-EU-071410">click here</a>.</p>
<p>
	If you have any questions or comments about this issue, our report, or the webinar, we&#39;d love to hear from you.</p>
<p>
	Thanks!</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Integrated, Holistic Security Strategies]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/integrated-holistic-security-strategies</link>
      <description><![CDATA[<p>
	Holistic is a popular word these days.&nbsp;Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the function of an entity as a whole, including the interdependence of all its parts.&nbsp;Given this broader meaning, holistic can (and should) be applied when thinking strategically about the way a business organization operates.&nbsp;Successful, well-functioning organizations most adapt to change, be flexible in their relationships, and innovative in their approach to business.&nbsp;They must not only have the capacity to react to change, but to anticipate change and act innovatively.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Benchmarking Information Security Efficiency]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/benchmarking-information-security-efficiency</link>
      <description><![CDATA[<p>
	Recently the Ponemon Institute completed a new project, the Security Efficiency Benchmark Study, the purpose of which was to learn what IT security leaders in the UK and European think are the key components to having an efficient and effective security operation.&nbsp;In other words, we wanted to know what is necessary for achieving data security goals and protect information assets and infrastructure.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Think Before you Cloud]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/think-before-you-cloud</link>
      <description><![CDATA[<p>
	A few years ago, when wireless networking was still relatively new, there were numerous reports of enterprising employees who, frustrated with the pace of new technology integration in their workplace, took it upon themselves to deploy rogue access points &ndash; often hidden behind furniture or above drop-down ceiling panels &ndash; in order to provide convenient mobility around the office.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Fear and Loathing in Online Advertising]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/fear-and-loathing-in-online-advertising</link>
      <description><![CDATA[<p>
	Have you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or event that you found interesting, you simply refused to click on the image because of a nagging sense of trepidation?&nbsp;What <em>really </em>lies beyond that alluring digital veil?&nbsp;Is the offer worth the risk?&nbsp;What of my digital privacy might I be giving up by responding to that message?</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[The Road to Data Breach is Paved with Good Intentions]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/the-road-to-data-breach-is-paved-with-good-intentions</link>
      <description><![CDATA[<p>
	We recently completed some new research with Accenture in which we were surprised to find that, in spite of all the attention being paid to data protection, and in spite of new and updated data protection regulations, complacency is beginning to settle in among many companies.</p>
<p>
	Yes, I said complacency.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[2010 Security in the Trenches]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/security-in-the-trenches</link>
      <description><![CDATA[<p>
	We just completed a survey of federal IT security professionals to examine the data protection posture of government agencies.&nbsp;Through the survey, sponsored by CA, we wanted to see whether or not there is consistency in the perception of rank-and-file employees and executive management as it pertains to the safeguarding of sensitive information, regulatory compliance, and the day-to-day management and execution of a security program.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Training Is the Strongest Link]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/training-is-the-strongest-link</link>
      <description><![CDATA[<p>
	Today we held a RIM College event featuring three noted experts in corporate privacy training programs -- namely, Dean Forbes (Merck), Bob Posch (Merck) and John Block (Media Pro). &nbsp;Our focus is: what are leading companies doing to achieve awareness and knowledge about privacy and data protection requirements?</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Sophos & Ponemon Institute Announces New Study]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/sophos-ponemon-institute-announces-new-study</link>
      <description><![CDATA[<p>
	We are pleased to present<i> The State of Privacy and Data Security Compliance</i> study conducted by Ponemon Institute and sponsored by Sophos. The purpose of the study is to determine if various international, federal and state data security laws improve an organization&rsquo;s security posture. What is the value of compliance and does it correlate with the value of the compliance effort?</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Crowe Horwath & Ponemon release HITECH study]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/crowe-horwath-ponemon-release-hitech-study</link>
      <description><![CDATA[<p>
	I am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations.&nbsp;Of 77 participating covered entities and business associates, 27% percent have not started or are barely aware of what they need to do, 32% are waiting for more details, 14% have a plan but are waiting for more details, and 21% are just starting to act.&nbsp; This data was collected&nbsp;from&nbsp;June&nbsp;through October 2009. If you are affected by the HITECH Act, this benchmark study may be helpful to you.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[eGov Initiative Not Without Risk to Citizen Data]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/egov-initiative-not-without-risk-to-citizen-data</link>
      <description><![CDATA[<p>
	The eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a higher quality of service to their customers.&nbsp;Constituent services have been available online for years, certainly, but only recently has the effort to modernize government been policy.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[The Goal is Credibility]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/the-goal-is-credibility</link>
      <description><![CDATA[<p>
	I want to share an article with you that I think has a tremendous lesson for anyone in the business of building trust.&nbsp; The article is from a recent edition of <em>Foreign Policy </em>(reprinted from <em>Joint Force Quarterly</em>), but don&#39;t let the source put you off.&nbsp; Admiral Michael G. Mullen, chairman of the Joint Chiefs of Staff, writes about what it takes to&nbsp;establish credibility&nbsp;and build trust.</p>
<p>
	Admiral Mullen&#39;s perspective is different from yours and mine, but there are nuggets here that are vital no matter what your business.</p>
<p>
	&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Archer-Ponemon Treaty for Data Governance]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/archer-ponemon-treaty-for-data-governance</link>
      <description><![CDATA[<p>
	I&rsquo;m still processing a lot of the information gathered, shared, and created during our 8<sup>th</sup> RIM Renaissance this past weekend in Minneapolis.&nbsp;One of our sessions focused on the creation of an information governance &ldquo;treaty&rdquo; that holds various organizational members to a high standard (consistent with our RIM principles).&nbsp;Please review the following draft document and let me know what you think.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Thank You, Friends of the Ponemon Institute!]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/thank-you-friends-of-the-ponemon-institute</link>
      <description><![CDATA[<p>
	A warm thank you to everyone who made this past weekend&#39;s RIM Renaissance a success.&nbsp; The discussions were lively and productive, and I think we all came away just a little bit smarter as a result of the candor.&nbsp; We do appreciate the enthusiasm that seems to pervade these events, and the willingness to put aside your valuable time to join with us on these annual occasions, as well as the ongoing conversations that take place throughout the year.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[What We have here is, Failure to Communicate]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/what-we-have-here-is-failure-to-communicate</link>
      <description><![CDATA[<p>
	Privacy pro: Do you ever feel like you are working overtime to meet overly ambitious expectations?&nbsp;Are you frustrated by your attempts to outline a plan for protecting sensitive personal information only to get the sense that you are talking to a brick wall?</p>
<p>
	CEO: Are you puzzled as to why the people your company has hired to address security and privacy concerns never seem to meet the objectives you have for them?&nbsp;Are you flummoxed by the fact that the investments you&rsquo;ve made in data security aren&rsquo;t helping to stem the tide of data loss?&nbsp;</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[More Employees Ignoring Data Security Policies]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/more-employees-ignoring-data-security-policies</link>
      <description><![CDATA[<p>
	Does it surprise you to learn that, according to our recent study, <i>Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, </i>employee compliance with corporate data security policies is on the wane?</p>
<p>
	Why do you think this is?&nbsp; I&rsquo;m seeing a confluence of conditions that appear to be contributing to this challenge to data integrity: the development of new, mobile technologies that empower employees to do more while away from the office; a failure of organizations to keep pace with the ways technology is changing the dynamics of data security; and current economic conditions that are putting increased pressure on individuals to be more productive with fewer resources.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
    <item>
      <title><![CDATA[Dr. Ponemon's Blog]]></title>
      <author></author>
      <link>http://www.ponemon.org/blog/dr-ponemons-blog</link>
      <description><![CDATA[<p>
	Welcome to my new blog. I look forward to sharing some of our thought provoking research. I also look forward to receiving your comments and questions. Stay tuned.</p>
]]></description>
      <pubDate>Wed, 12 Jul 2017 06:25:05 -0400</pubDate>
    </item>
  </channel>
</rss>
