MEASURING TRUST IN PRIVACY AND SECURITY
Ponemon Institute
Sign Up for the Ponemon News Feed for special reports and important updates regarding privacy and security

News & Updates

Ponemon Institute is pleased to announce the release of Flipping the Economics of Attacks, sponsored by Palo Alto Networks. In this study, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.

...more


Ponemon Library Archives for December 2012
2013 State of the Endpoint
December 5, 2012, 12:00 am

 

 (Click to download study) We are pleased to present the results of the 2013 State of the Endpoint study sponsored by Lumension® and conducted by Ponemon Institute. Since 2010, we have tracked endpoint risk in organizations, the resources to address the risk and the technologies deployed to manage threats.

This study reveals that the state of endpoint risk is not improving. One of the top concerns is the proliferation of personally owned mobile devices in the workplace such as smart phones and iPads. In fact, 80 percent of those surveyed say laptops and other mobile data-bearing devices pose a significant security risk to their organization’s networks or enterprise systems because they are not secure. Yet, only 13 percent say they use stricter security standards for employees’ personal devices rather than for corporate-owned devices.

Third Annual Patient Privacy & Data Security Study
December 6, 2012, 12:00 am

(click to download study) Healthcare organizations seem to face an uphill battle in their efforts to stop and reduce the loss or theft of protected health information (PHI) or patient information. As is revealed in the Third Annual Benchmark Study on Patient Privacy and Data Security sponsored by ID Experts, many healthcare organizations struggle with a lack of technologies, resources and trained personnel to deal with privacy and data security risks.

Categories
Security (23)
Privacy (22)
global security (1)
Providers (1)