MEASURING TRUST IN PRIVACY AND SECURITY
Ponemon Institute
Sign Up for the Ponemon News Feed for special reports and important updates regarding privacy and security

News & Updates

Ponemon Institute is pleased to announce the release of Flipping the Economics of Attacks, sponsored by Palo Alto Networks. In this study, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.

...more


Ponemon Library Archives for February 2014
Threat Intelligence & Incident Response: A Study of U.S and EMEA Organizations
February 19, 2014, 12:00 am

Sponsored by AccessData, we are pleased to present the findings of Threat Intelligence & Incident Response: A Study of U.S and EMEA Organizations. The complete report is available for download.

When a cyber attack or other security incident occurs, CISOs and their security teams must be able to explain the details of the incident to senior management. Often without being given the time to gather the necessary intelligence to provide an accurate assessment of the problem.
 

Understaffed and at Risk: Today’s IT Security Department
February 24, 2014, 12:00 am

Understaffed and at Risk: Today’s IT Security Department was conducted by Ponemon Institute and sponsored by HP Enterprise Security to understand the current state of staffing today’s IT security department.

2014 Best Schools For Cybersecurity
February 28, 2014, 12:00 am

Ponemon Institute’s research has consistently revealed that one of the major barriers to achieving a strong security posture is the dearth of trained and skilled security professionals. To bring attention to this rising crisis in recruiting and retaining highly skilled professionals in IT security, HP commissioned Ponemon Institute to conduct two studies on the issues of cybersecurity education and IT security hiring practices in organizations.

Categories
Security (23)
Privacy (22)
global security (1)
Providers (1)