Ponemon Institute
Sign Up for the Ponemon News Feed for special reports and important updates regarding privacy and security

News & Updates

Ponemon Institute is pleased to announce the release of Flipping the Economics of Attacks, sponsored by Palo Alto Networks. In this study, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.


Ponemon Library Archives for October 2015
The State of Cybersecurity in Local, State and Federal Government
October 9, 2015, 12:00 am

Sponsored by Hewlett Packard Enterprise and independently conducted by Ponemon Institute, the purpose of this research is to learn the challenges IT and IT security practitioners face in keeping various government agencies secure from attacks and threats. Similar to the private sector, government is the target of cybercriminals and nation state attackers.

The complete report is available for download.

2015 Cost of Cyber Crime Study: United States
October 9, 2015, 9:00 am

We are pleased to present the 2015 Cost of Cyber Crime Study: United States, the sixth annual study of US companies.  Sponsored by Hewlett Packard Enterprise, this year’s study is based on a representative sample of 58 organizations in both the public and private sectors. While our research focused on organizations located in the United States, most are multinational corporations.

The complete report is available for download.

The Rise of Nation State Attacks
October 23, 2015, 12:00 am

The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation state attacks due to an uncertainty as to what a nation state attack is and how to identify the key characteristics, methods and motives of these attacks that originate with foreign governments. 

The complete study is available for download.

Security (23)
Privacy (22)
global security (1)
Providers (1)