- February 22, 2016How Much Is the Data on Your Mobile Device Worth?The purpose of this research, sponsored by Lookout, is to understand the value of the data we access and store on our mobile devices and if we are doing enough to protect t...Read More
- February 17, 2016Flipping the Economics of AttacksIn Flipping the Economics of Attacks, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwar...Read More
- February 5, 2016The Cyber Resilient Organization in Germany: Learning to Thrive against ThreatsPonemon Institute, with sponsorship from Resilient Systems, surveyed 445 IT and IT security practitioners in Germany about their organizations’ approach to becoming r...Read More
- January 19, 20162016 Cost of Data Center OutagesPonemon Institute and Emerson Network Power are pleased to present the results of the 2016 Cost of Data Center Outages. Previously conducted in 2010 and 2013, the purpose o...Read More
- December 21, 2015Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better WayThe Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way reveals interesting trends in how organizations are participating in initiativ...Read More
- November 4, 2015The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better WayWe are pleased to let you know about our latest study on intelligence sharing. The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way...Read More
- October 28, 2015Advanced Threat Detection with Machine-Generated IntelligenceCompanies are losing traction in the fight to identify and prevent advanced persistent threats (APTs) mainly because threat intelligence is often inaccurate or incomplete. ...Read More
- October 23, 2015The Rise of Nation State AttacksThe Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation st...Read More
- October 9, 20152015 Cost of Cyber Crime Study: United StatesWe are pleased to present the 2015 Cost of Cyber Crime Study: United States, the sixth annual study of US companies. Sponsored by Hewlett Packard Enterprise, this yea...Read More
- October 9, 2015The State of Cybersecurity in Local, State and Federal GovernmentSponsored by Hewlett Packard Enterprise and independently conducted by Ponemon Institute, the purpose of this research is to learn the challenges IT and IT security practit...Read More
- September 29, 2015What You Don’t Know Will Hurt You: A Study of the Risk from Application Access and UsageCompanies and their employees are becoming increasingly dependent upon applications to achieve business goals and increase productivity. However, the proliferation of appli...Read More
- September 18, 2015The Cyber Resilient Organization: Learning to Thrive against ThreatsPonemon Institute, with sponsorship from Resilient Systems, surveyed 623 IT and IT security practitioners about their organizations’ approach to becoming resilient to...Read More
- August 26, 2015What Erodes Trust in Digital Brands?CMOs know that website performance in turn drives marketing performance. While marketers control some of the factors that sharpen the online experience—accurate conte...Read More
- June 9, 2015Around the world, IT security practitioners face a common problem: a budget that is inadequate to deal with cyber threatsOur latest global study looks at how companies in four global regions are investing in technologies, qualified personnel and governance practices to safeguard their informa...Read More
- May 28, 2015Ponemon Institute Releases New Study on the Efforts of Retail Companies and Financial Services to Improve the Time to Detect and Contain Advanced ThreatsAdvanced Threats in Financial Services and Retail: A Study of North America & EMEA, sponsored by Arbor Networks looks at how companies are using metrics such as mean ti...Read More
- May 27, 2015Cost of Data Breach Grows as does Frequency of AttacksHigh-profile data breaches are a wake-up call to enterprises everywhere. Senior executives can view such episodes as cautionary tales that showcase how the theft, misuse or...Read More
- May 25, 20152015 Cost of data breach: GlobalPonemon Institute is pleased to present its ninth annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. According to the benchmark study of 314 companies spa...Read More
- May 7, 2015Criminal Attacks: The New Leading Cause of Data Breach in HealthcareThe Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, sponsored by ID Experts, shows that, for the first time, criminal attacks are the number-one ...Read More
- April 27, 2015New Ponemon Institute study released: Economic Impact of Mixed Content Warnings on Consumer BehaviorWe have all encountered mixed content warnings that show a visual icon or pop-up that attempts to warn us while visiting a website. A new study by Ponemon Institute, sponso...Read More
- April 19, 2015A Few Challenges in Calculating Total Cost of a Data Breach Using Insurance Claims Payment DataLet me first state that I am a big fan of the Verizon DBIR and have read every one. I also have a great deal of respect for the NetDiligence Cyber Claims Study and like man...Read More
- April 16, 2015Why Ponemon Institute’s Cost of Data Breach Methodology Is Sound and EnduresThis week, Verizon released its annual 2015 Data Breach Investigations Report. We respect the amount of effort and resources Verizon devotes to its annual report. In the pa...Read More
- April 10, 2015Ponemon Institute releases new study on how organizations can leapfrog to a stronger cyber security postureIs your company’s security strategy stuck in a rut? Are you concerned that the competition is outpacing you in its ability to deal with increasingly sophisticated and...Read More
- February 17, 2015The Cyber Readiness of Canadian OrganizationsSponsored by Scalar and independently conducted by Ponemon Institute, the purpose of this research is to study how Canadian organizations are responding to cyber security t...Read More
- January 29, 2015The Security Impact of Mobile Device Use by EmployeesWhat do employees think about the use of mobile devices in the workplace? Are they concerned about the security of their devices? Are they aware of potential risks to corpo...Read More
- January 28, 20152014: A Year of Mega Breaches 22014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013 and ending with Sony Pictures Entertainment. In...Read More
Blog
Categories
Tags
- Access Governance (1)
- Access Management (1)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (2)
- Application Security (3)
- Authentication Process (1)
- Best Practices (20)
- Big Data (2)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (4)
- Communication Inefficiency (1)
- Compliance (9)
- Confidential Data (1)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (1)
- Cryptography (2)
- Cyber Attack (1)
- Cyber Attacks (15)
- Cyber Crime (10)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (1)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (1)
- Cyber Threat (2)
- Cybersecurity Risk (1)
- Data Breach (30)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (4)
- Data Loss (1)
- Data Protection (24)
- Data Security (15)
- DDoS (1)
- Denial Of Service (1)
- Detection (1)
- Digital Certificate Management (1)
- DLP (2)
- Ecommerce Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encryption (4)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (6)
- Explanation Of Benefits (1)
- File Sharing (1)
- Fraud (3)
- Geo-location (1)
- Global Security (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Identity Governance (1)
- Incident Response (2)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (2)
- Intellectual Property (1)
- Internet Of Things (1)
- IT Architecture (1)
- IT Security (10)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- Managed Security Services Providers (1)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mixed Content Warnings (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (10)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- MSSP (1)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (2)
- Online Banking (1)
- Online Health Services (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- Post Breach (1)
- Privacy (8)
- Privacy Compliance (1)
- Privileged Access Management (1)
- Privileged User (1)
- Productivity (1)
- Providers (3)
- Ransomware (1)
- Regulated Data (1)
- Retail Banking (2)
- RIM Renaissance (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk To Knowledge Assets (1)
- SaaS (1)
- Safeguard High Value Assets (1)
- Security (7)
- Security Innovation (1)
- Security Intelligence (1)
- Security Posture (1)
- Security Professional (2)
- Security Risk (2)
- Security Strategy (2)
- Security Technologies (2)
- Security Threat (1)
- Senior Executives (2)
- SIEM (1)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SSO (1)
- State Of Endpoint (1)
- System Glitch (1)
- Technology (2)
- Threat Intelligence (6)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Vulnerable Code (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202020192018201720162015- January (7)
- February (1)
- April (4)
- May (4)
- June (1)
- August (1)
- September (2)
- October (4)
- November (1)
- December (1)
- January (4)
- February (4)
- March (4)
- April (3)
- May (2)
- June (3)
- July (2)
- September (2)
- October (3)
- December (1)
- January (2)
- February (6)
- March (1)
- May (2)
- June (2)
- July (1)
- August (2)
- September (2)
- October (1)
- December (1)