Results
- November 4, 2011Best Practices in Data Protection Study ReleasedSponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...Read More
- August 2, 2011Second annual cost of cyber crime study is releasedToday we released our Second Annual Cost of Cyber Crime Study. Our findings support other research studies suggesting increases in the frequency, severity and overall...Read More
- April 3, 2011Are we taking adequate steps to protect the critical infrastructure?Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...Read More
- March 8, 2011Cost of a data breach climbs higherMost privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...Read More
- March 7, 2011Listen to a new podcast on the True Cost of Compliance studyDear friends and colleagues, Please listen to a recent podcast on the True Cost of Compliance study completed last month. Martin KcMeay at Network Security Blog did a...Read More
- January 31, 2011Compliance Like a ClubHave you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information secur...Read More
- November 9, 2010Poor Privacy Practice is Ailing Healthcare IndustryIt has been more than six years since the ChoicePoint data breach thrust the issue of privacy protection into the headlines. Since then hundreds of information securit...Read More
- July 15, 2010Information Governance in the CloudJust a brief note to bring our recent webinar to your attention. I presented Information Governance in the Cloud along with the good people at Symantec. Th...Read More
- July 12, 2010Integrated, Holistic Security StrategiesHolistic is a popular word these days. Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the fun...Read More
- May 3, 2010Fear and Loathing in Online AdvertisingHave you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or ev...Read More
- April 19, 2010The Road to Data Breach is Paved with Good IntentionsWe recently completed some new research with Accenture in which we were surprised to find that, in spite of all the attention being paid to data protection, and in spite of...Read More
- February 17, 2010How Global Organizations Approach the Challenge of Protecting Personal DataHow data privacy perceptions and practices around the globe inform and influence data protection practices. More than 5,500 business leaders were surveyed....Read More
- February 17, 2010Making Web 2.0 WorkPonemon Institute with sponsorship from IBM conducted a study of Web 2.0 users in the US, Brazil, Russian Federation, People's Republic of China, Singapore, Sweden and Germ...Read More
- January 18, 20102010 Access Governance Trends SurveyThis second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...Read More
- November 21, 2009Crowe Horwath & Ponemon release HITECH studyI am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 7...Read More
- November 19, 2009eGov Initiative Not Without Risk to Citizen DataThe eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...Read More
- August 31, 2009The Goal is CredibilityI want to share an article with you that I think has a tremendous lesson for anyone in the business of building trust. The article is from a recent edition of Foreign...Read More
- July 21, 2009Archer-Ponemon Treaty for Data GovernanceI’m still processing a lot of the information gathered, shared, and created during our 8th RIM Renaissance this past weekend in Minneapolis. One of our sessions ...Read More
- July 20, 2009Thank You, Friends of the Ponemon Institute!A warm thank you to everyone who made this past weekend's RIM Renaissance a success. The discussions were lively and productive, and I think we all came away just a l...Read More
- June 10, 2009More Employees Ignoring Data Security PoliciesDoes it surprise you to learn that, according to our recent study, Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, employee c...Read More