MEASURING TRUST IN PRIVACY AND SECURITY
Ponemon Institute
Sign Up for the Ponemon News Feed for special reports and important updates regarding privacy and security

News & Updates

Ponemon Institute is pleased to announce the release of Flipping the Economics of Attacks, sponsored by Palo Alto Networks. In this study, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.

...more


Ponemon Library Archives for January 2015
2015 State of the Endpoint Report: User-Centric Risk
January 14, 2015, 2:30 pm

Ponemon Institute and Lumension are pleased to present the results from the 2015 State of the Endpoint Report: User-Centric Risk. The purpose of this study is to understand trends and changes in endpoint risk in organizations. An endpoint can include servers, desktops, laptops, smartphones, and even printers, ATMs and PoS devices.

The complete study is available here.

2014: A Year of Mega Breaches
January 22, 2015, 12:00 am

Ponemon Institute is pleased to present the findings of 2014: A Year of Mega Breaches
sponsored by Identity Finder. The complete report is available for download.

The Cost of Malware Containment
January 26, 2015, 12:00 am

Ponemon Institute is pleased to present the findings of The Cost of Malware Containment sponsored by Damballa. The complete report is available for download.

The Security Impact of Mobile Device Use by Employees
January 29, 2015, 12:00 am

What do employees think about the use of mobile devices in the workplace? Are they concerned about the security of their devices? Are they aware of potential risks to corporate information when using smartphones and tablets?

The Security Impact of Mobile Device Use by Employees, sponsored by Accellion and conducted by Ponemon Institute examines employees’ perceptions about the secure use of mobile devices to access corporate information.

Categories
Security (23)
Privacy (22)
global security (1)
Providers (1)