Results
- November 6, 2020Why Legacy Firewalls Are Ineffective in Securing Applications and Data in the Data CenterRethinking Firewalls: Security and Agility for the Modern Enterprise, sponsored by Guardicore, was conducted to learn how enterprises perceive their legacy firewalls within...Read More
- September 22, 2020The Need to Close the Cultural Divide between Application Security and DevelopersA security risk that many organizations are not dealing with is the cultural divide between application security and developers. In this research sponsored by ZeroNorth, we...Read More
- January 22, 20152014: A Year of Mega BreachesPonemon Institute, with sponsorship from Identity Finder, conducted 2014: A Year of Mega Breaches to understand if and how organizations have changed their data protection ...Read More
- October 29, 2014Security & Compliance Trends in Innovative Electronic PaymentsNew electronic payment systems and virtual currencies are expected to make paper currency the horse and buggy of the 21st century. Are organizations up to the challen...Read More
- June 25, 2013The State of Risk Based Security ManagementPonemon Institute and Tripwire continue to study the state of risk-based security management. This annual study is conducted to understand the level of maturity of RBSM. In...Read More
- July 10, 2012Encryption in the Cloud Who is responsible for data protection in the cloud?Ponemon Institute is pleased to present the findings of Encryption in the Cloud. This research is a supplementary report that is part of a larger study entitled the 2011 Gl...Read More
- February 4, 2011Understanding Security Complexity in 21st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & GermanyUnderstanding Security Complexity in 21st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany, sponsored by Check Point Software...Read More