Results
- January 28, 20152014: A Year of Mega Breaches 22014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013 and ending with Sony Pictures Entertainment. In...Read More
- October 29, 2014Security & Compliance Trends in Innovative Electronic PaymentsNew electronic payment systems and virtual currencies are expected to make paper currency the horse and buggy of the 21st century. Are organizations up to the challen...Read More
- March 18, 2011What Auditors Think about Crypto technologiesSponsored by Thales eSecurity(download the study) The purpose of this study was to identify what auditors think abut crypto technologies as it applies to data protection an...Read More
- March 7, 2011Listen to a new podcast on the True Cost of Compliance studyDear friends and colleagues, Please listen to a recent podcast on the True Cost of Compliance study completed last month. Martin KcMeay at Network Security Blog did a...Read More
- January 31, 2011Compliance Like a ClubHave you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information secur...Read More
- January 5, 2011The True Cost of Compliance: A Benchmark Study of Multinational OrganizationsTHE COST OF NON-COMPLIANCE CAN BE MORE EXPENSIVE THAN INVESTING IN COMPLIANCE ACTIVITIES While the average cost of compliance for the organizations in our study is $3.5 mil...Read More
- January 18, 20102010 Access Governance Trends SurveyThis second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...Read More
- November 21, 2009Crowe Horwath & Ponemon release HITECH studyI am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 7...Read More
- June 10, 2009More Employees Ignoring Data Security PoliciesDoes it surprise you to learn that, according to our recent study, Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, employee c...Read More