Results
- January 22, 20152014: A Year of Mega BreachesPonemon Institute, with sponsorship from Identity Finder, conducted 2014: A Year of Mega Breaches to understand if and how organizations have changed their data protection ...Read More
- June 27, 2013The Risk of Regulated Data on Mobile Devices & in the CloudWe are pleased to announce the release of a new Ponemon Institute study sponsored by WatchDox. If you ever worry about an employee downloading confidential, regulated data ...Read More
- February 6, 2012The Business Case for Data Protection: What Senior Executives Think about Data ProtectionWhat Senior Executives Think about Data Protection, conducted by Ponemon Institute and sponsored by IBM, was conducted to determine what corporate executives believe a...Read More
- January 12, 2012The Human Factor in Data ProtectionPonemon Institute is pleased to present the results of The Human Factor in Data Protection. Sponsored by Trend Micro, this research focuses on how employees and other ...Read More
- January 9, 2012Aftermath of a Data Breach StudyWe are pleased to present the findings of the Aftermath of a Data Breach conducted by Ponemon Institute and sponsored by Experian® Data Breach Resolution. Th...Read More
- November 4, 2011Best Practices in Data Protection Study ReleasedSponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...Read More
- July 31, 2011Most trusted companies for privacyPonemon Institute is releasing our annual Most Trusted Companies for Privacy study this coming week. This is the eighth year that we conducted a U.S. national consume...Read More
- April 3, 2011Are we taking adequate steps to protect the critical infrastructure?Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...Read More
- March 18, 2011What Auditors Think about Crypto technologiesSponsored by Thales eSecurity(download the study) The purpose of this study was to identify what auditors think abut crypto technologies as it applies to data protection an...Read More
- March 8, 2011Cost of a data breach climbs higherMost privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...Read More
- November 9, 2010Poor Privacy Practice is Ailing Healthcare IndustryIt has been more than six years since the ChoicePoint data breach thrust the issue of privacy protection into the headlines. Since then hundreds of information securit...Read More
- October 14, 2010Data Center Outages and Data ManagementI hear the collective sound of our friends, colleagues, and other interested parties scratching their heads at the release of the most recent piece of Ponemon Institute res...Read More
- April 17, 2010Economic Impact of Privacy on Online Behavioral AdvertisingIndependent Ponemon Institute research looks into the controversial behavioral advertising industry to understand from marketers their experience with the medium’s su...Read More
- April 14, 20102010 Security in the TrenchesWe just completed a survey of federal IT security professionals to examine the data protection posture of government agencies. Through the survey, sponsored by CA, we ...Read More
- February 17, 2010How Global Organizations Approach the Challenge of Protecting Personal DataHow data privacy perceptions and practices around the globe inform and influence data protection practices. More than 5,500 business leaders were surveyed....Read More
- January 18, 20102010 Access Governance Trends SurveyThis second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...Read More
- December 10, 2009Training Is the Strongest LinkToday we held a RIM College event featuring three noted experts in corporate privacy training programs -- namely, Dean Forbes (Merck), Bob Posch (Merck) and John Block (Med...Read More
- December 5, 2009Sophos & Ponemon Institute Announces New StudyWe are pleased to present The State of Privacy and Data Security Compliance study conducted by Ponemon Institute and sponsored by Sophos. The purpose of the study is to det...Read More
- November 21, 2009Crowe Horwath & Ponemon release HITECH studyI am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 7...Read More
- November 19, 2009eGov Initiative Not Without Risk to Citizen DataThe eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...Read More
- August 31, 2009The Goal is CredibilityI want to share an article with you that I think has a tremendous lesson for anyone in the business of building trust. The article is from a recent edition of Foreign...Read More
- July 21, 2009Archer-Ponemon Treaty for Data GovernanceI’m still processing a lot of the information gathered, shared, and created during our 8th RIM Renaissance this past weekend in Minneapolis. One of our sessions ...Read More
- July 14, 2009What We have here is, Failure to CommunicatePrivacy pro: Do you ever feel like you are working overtime to meet overly ambitious expectations? Are you frustrated by your attempts to outline a plan for protecting...Read More
- January 17, 2008Annual Privacy Trust Study for Retail BankingIt should come as no surprise that trust is increasingly important in customers’ loyalty to their bank. While overall trust in the industry is down, banks that experi...Read More