- February 14, 2012Global Study on Mobility Risks Survey Results for: United StatesTo help IT security professionals plan for an increasingly mobile electronic workforce, Websense, Inc. and Ponemon Institute have created this Global Study on Mobility Risk...Read More
- February 6, 2012The Business Case for Data Protection: What Senior Executives Think about Data ProtectionWhat Senior Executives Think about Data Protection, conducted by Ponemon Institute and sponsored by IBM, was conducted to determine what corporate executives believe a...Read More
- January 12, 2012The Human Factor in Data ProtectionPonemon Institute is pleased to present the results of The Human Factor in Data Protection. Sponsored by Trend Micro, this research focuses on how employees and other ...Read More
- January 9, 2012Aftermath of a Data Breach StudyWe are pleased to present the findings of the Aftermath of a Data Breach conducted by Ponemon Institute and sponsored by Experian® Data Breach Resolution. Th...Read More
- December 1, 2011Second Annual Patient Privacy Study ReleasedWidespread use of mobile devices is putting patient data at risk, according to the latest Ponemon Institute research on healthcare providers' patient privacy practices.Whil...Read More
- December 1, 20112011 Privacy Trust Study for Retail BankingOur study reveals that even among banks with the highest level of consumer trust, it only takes one or two large data breaches to diminish a trusted relationship. Our findi...Read More
- November 4, 2011Best Practices in Data Protection Study ReleasedSponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...Read More
- August 10, 20112011 Second Annual Cost of Cyber Crime Study Benchmark Study of U.S. CompaniesDespite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and governm...Read More
- August 2, 2011Second annual cost of cyber crime study is releasedToday we released our Second Annual Cost of Cyber Crime Study. Our findings support other research studies suggesting increases in the frequency, severity and overall...Read More
- July 31, 2011Most trusted companies for privacyPonemon Institute is releasing our annual Most Trusted Companies for Privacy study this coming week. This is the eighth year that we conducted a U.S. national consume...Read More
- June 10, 2011How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United StatesThe US healthcare industry is undergoing a period of sweeping reforms designed to improve patient care and reduce costs through the adoption of electronic health records th...Read More
- May 2, 2011Ponemon Releases Cloud Service Provider StudyLast week with CA Technologies we issued the results of a study of cloud service providers and their views on cloud security. There has been a lot of interest in this study...Read More
- April 3, 2011Are we taking adequate steps to protect the critical infrastructure?Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...Read More
- March 18, 2011What Auditors Think about Crypto technologiesSponsored by Thales eSecurity(download the study) The purpose of this study was to identify what auditors think abut crypto technologies as it applies to data protection an...Read More
- March 8, 2011Cost of a data breach climbs higherMost privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...Read More
- March 7, 2011Listen to a new podcast on the True Cost of Compliance studyDear friends and colleagues, Please listen to a recent podcast on the True Cost of Compliance study completed last month. Martin KcMeay at Network Security Blog did a...Read More
- February 4, 20112011 Cost of Data Center Outages: Sponsored by Emerson Network PowerThe Cost of Data Center Outages study is the first benchmark study that attempts to estimate the full costs associated with an unplanned data center outage. This benchmark ...Read More
- February 4, 2011Understanding Security Complexity in 21st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & GermanyUnderstanding Security Complexity in 21st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany, sponsored by Check Point Software...Read More
- January 31, 2011Compliance Like a ClubHave you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information secur...Read More
- January 5, 2011The True Cost of Compliance: A Benchmark Study of Multinational OrganizationsTHE COST OF NON-COMPLIANCE CAN BE MORE EXPENSIVE THAN INVESTING IN COMPLIANCE ACTIVITIES While the average cost of compliance for the organizations in our study is $3.5 mil...Read More
- November 9, 2010Poor Privacy Practice is Ailing Healthcare IndustryIt has been more than six years since the ChoicePoint data breach thrust the issue of privacy protection into the headlines. Since then hundreds of information securit...Read More
- October 14, 2010Data Center Outages and Data ManagementI hear the collective sound of our friends, colleagues, and other interested parties scratching their heads at the release of the most recent piece of Ponemon Institute res...Read More
- September 30, 2010National Survey on Data Center OutagesPonemon Institute and Emerson Network Power are pleased to present the results of the National Survey on Data Center Outages . The purpose of this study is to determine the...Read More
- July 15, 2010Information Governance in the CloudJust a brief note to bring our recent webinar to your attention. I presented Information Governance in the Cloud along with the good people at Symantec. Th...Read More
- July 12, 2010Integrated, Holistic Security StrategiesHolistic is a popular word these days. Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the fun...Read More
Blog
Categories
Tags
- Access Governance (1)
- Access Management (1)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (2)
- Application Security (3)
- Authentication Process (1)
- Best Practices (20)
- Big Data (2)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (4)
- Communication Inefficiency (1)
- Compliance (9)
- Confidential Data (1)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (1)
- Cryptography (2)
- Cyber Attack (1)
- Cyber Attacks (15)
- Cyber Crime (10)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (1)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (1)
- Cyber Threat (2)
- Cybersecurity Risk (1)
- Data Breach (30)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (4)
- Data Loss (1)
- Data Protection (24)
- Data Security (15)
- DDoS (1)
- Denial Of Service (1)
- Detection (1)
- Digital Certificate Management (1)
- DLP (2)
- Ecommerce Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encryption (4)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (6)
- Explanation Of Benefits (1)
- File Sharing (1)
- Fraud (3)
- Geo-location (1)
- Global Security (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Identity Governance (1)
- Incident Response (2)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (2)
- Intellectual Property (1)
- Internet Of Things (1)
- IT Architecture (1)
- IT Security (10)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- Managed Security Services Providers (1)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mixed Content Warnings (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (10)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- MSSP (1)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (2)
- Online Banking (1)
- Online Health Services (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- Post Breach (1)
- Privacy (8)
- Privacy Compliance (1)
- Privileged Access Management (1)
- Privileged User (1)
- Productivity (1)
- Providers (3)
- Ransomware (1)
- Regulated Data (1)
- Retail Banking (2)
- RIM Renaissance (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk To Knowledge Assets (1)
- SaaS (1)
- Safeguard High Value Assets (1)
- Security (7)
- Security Innovation (1)
- Security Intelligence (1)
- Security Posture (1)
- Security Professional (2)
- Security Risk (2)
- Security Strategy (2)
- Security Technologies (2)
- Security Threat (1)
- Senior Executives (2)
- SIEM (1)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SSO (1)
- State Of Endpoint (1)
- System Glitch (1)
- Technology (2)
- Threat Intelligence (6)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Vulnerable Code (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202020192018201720162015- January (7)
- February (1)
- April (4)
- May (4)
- June (1)
- August (1)
- September (2)
- October (4)
- November (1)
- December (1)
- January (4)
- February (4)
- March (4)
- April (3)
- May (2)
- June (3)
- July (2)
- September (2)
- October (3)
- December (1)
- January (2)
- February (6)
- March (1)
- May (2)
- June (2)
- July (1)
- August (2)
- September (2)
- October (1)
- December (1)