Results
- June 5, 2014Can a data breach in the cloud result in a larger and more costly incident?Can a data breach in the cloud result in a larger and more costly incident? Our latest study, Data Breach: The Cloud Multiplier Effect sponsored by Netskope reveals how the...Read More
- June 27, 2013The Risk of Regulated Data on Mobile Devices & in the CloudWe are pleased to announce the release of a new Ponemon Institute study sponsored by WatchDox. If you ever worry about an employee downloading confidential, regulated data ...Read More
- March 5, 2013Security of Cloud Computing Users 2013 StudyToday we are releasing a very interesting follow up study on how organizations are improving--or not--their cloud security practices. The Security of Cloud Computing Users ...Read More
- July 10, 2012Encryption in the Cloud Who is responsible for data protection in the cloud?Ponemon Institute is pleased to present the findings of Encryption in the Cloud. This research is a supplementary report that is part of a larger study entitled the 2011 Gl...Read More
- February 15, 20122011 Global Encryption Trends StudyPonemon Institute is pleased to present the findings of the 2011 Global Encryption Trends Study, sponsored by Thales e-Security. We surveyed 4,140 business and I...Read More