Blog

close Best Practices
Results
  1. November 4, 2011
    Best Practices in Data Protection Study Released
    Sponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...
  2. August 2, 2011
    Second annual cost of cyber crime study is released
    Today we released our Second Annual Cost of Cyber Crime Study.  Our findings support other research studies suggesting increases in the frequency, severity and overall...
  3. April 3, 2011
    Are we taking adequate steps to protect the critical infrastructure?
    Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...
  4. March 8, 2011
    Cost of a data breach climbs higher
    Most privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...
  5. March 7, 2011
    Listen to a new podcast on the True Cost of Compliance study
    Dear friends and colleagues, Please listen to a recent podcast on the True Cost of Compliance study completed last month.  Martin KcMeay at Network Security Blog did a...
  6. January 31, 2011
    Compliance Like a Club
    Have you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information secur...
  7. November 9, 2010
    Poor Privacy Practice is Ailing Healthcare Industry
    It has been more than six years since the ChoicePoint data breach thrust the issue of privacy protection into the headlines. Since then hundreds of information securit...
  8. July 15, 2010
    Information Governance in the Cloud
    Just a brief note to bring our recent webinar to your attention.  I presented Information Governance in the Cloud along with the good people at Symantec.  Th...
  9. July 12, 2010
    Integrated, Holistic Security Strategies
    Holistic is a popular word these days. Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the fun...
  10. May 3, 2010
    Fear and Loathing in Online Advertising
    Have you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or ev...
  11. April 19, 2010
    The Road to Data Breach is Paved with Good Intentions
    We recently completed some new research with Accenture in which we were surprised to find that, in spite of all the attention being paid to data protection, and in spite of...
  12. February 17, 2010
    How Global Organizations Approach the Challenge of Protecting Personal Data
    How data privacy perceptions and practices around the globe inform and influence data protection practices. More than 5,500 business leaders were surveyed....
  13. February 17, 2010
    Making Web 2.0 Work
    Ponemon Institute with sponsorship from IBM conducted a study of Web 2.0 users in the US, Brazil, Russian Federation, People's Republic of China, Singapore, Sweden and Germ...
  14. January 18, 2010
    2010 Access Governance Trends Survey
    This second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...
  15. November 21, 2009
    Crowe Horwath & Ponemon release HITECH study
    I am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 7...
  16. November 19, 2009
    eGov Initiative Not Without Risk to Citizen Data
    The eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...
  17. August 31, 2009
    The Goal is Credibility
    I want to share an article with you that I think has a tremendous lesson for anyone in the business of building trust.  The article is from a recent edition of Foreign...
  18. July 21, 2009
    Archer-Ponemon Treaty for Data Governance
    I’m still processing a lot of the information gathered, shared, and created during our 8th RIM Renaissance this past weekend in Minneapolis. One of our sessions ...
  19. July 20, 2009
    Thank You, Friends of the Ponemon Institute!
    A warm thank you to everyone who made this past weekend's RIM Renaissance a success.  The discussions were lively and productive, and I think we all came away just a l...
  20. June 10, 2009
    More Employees Ignoring Data Security Policies
    Does it surprise you to learn that, according to our recent study, Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, employee c...
Scroll to Top

Categories


Tags


Archive

2020201920182017201620152014201320122011201020092008