Security

  1. February 22, 2016
    How Much Is the Data on Your Mobile Device Worth?
    The purpose of this research, sponsored by Lookout, is to understand the value of the data we access and store on our mobile devices and if we are doing enough to protect t...
  2. February 17, 2016
    Flipping the Economics of Attacks
    In Flipping the Economics of Attacks, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwar...
  3. February 5, 2016
    The Cyber Resilient Organization in Germany: Learning to Thrive against Threats
    Ponemon Institute, with sponsorship from Resilient Systems, surveyed 445 IT and IT security practitioners in Germany about their organizations’ approach to becoming r...
  4. January 19, 2016
    2016 Cost of Data Center Outages
    Ponemon Institute and Emerson Network Power are pleased to present the results of the 2016 Cost of Data Center Outages. Previously conducted in 2010 and 2013, the purpose o...
  5. December 21, 2015
    Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way
    The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way reveals interesting trends in how organizations are participating in initiativ...
  6. November 4, 2015
    The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way
    We are pleased to let you know about our latest study on intelligence sharing. The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way...
  7. October 28, 2015
    Advanced Threat Detection with Machine-Generated Intelligence
    Companies are losing traction in the fight to identify and prevent advanced persistent threats (APTs) mainly because threat intelligence is often inaccurate or incomplete. ...
  8. October 23, 2015
    The Rise of Nation State Attacks
    The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation st...
  9. October 9, 2015
    2015 Cost of Cyber Crime Study: United States
    We are pleased to present the 2015 Cost of Cyber Crime Study: United States, the sixth annual study of US companies.  Sponsored by Hewlett Packard Enterprise, this yea...
  10. October 9, 2015
    The State of Cybersecurity in Local, State and Federal Government
    Sponsored by Hewlett Packard Enterprise and independently conducted by Ponemon Institute, the purpose of this research is to learn the challenges IT and IT security practit...
  11. September 29, 2015
    What You Don’t Know Will Hurt You: A Study of the Risk from Application Access and Usage
    Companies and their employees are becoming increasingly dependent upon applications to achieve business goals and increase productivity. However, the proliferation of appli...
  12. September 18, 2015
    The Cyber Resilient Organization: Learning to Thrive against Threats
    Ponemon Institute, with sponsorship from Resilient Systems, surveyed 623 IT and IT security practitioners about their organizations’ approach to becoming resilient to...
  13. August 26, 2015
    What Erodes Trust in Digital Brands?
    CMOs know that website performance in turn drives marketing performance. While marketers control some of the factors that sharpen the online experience—accurate conte...
  14. June 9, 2015
    Around the world, IT security practitioners face a common problem: a budget that is inadequate to deal with cyber threats
    Our latest global study looks at how companies in four global regions are investing in technologies, qualified personnel and governance practices to safeguard their informa...
  15. May 28, 2015
    Ponemon Institute Releases New Study on the Efforts of Retail Companies and Financial Services to Improve the Time to Detect and Contain Advanced Threats
    Advanced Threats in Financial Services and Retail: A Study of North America & EMEA, sponsored by Arbor Networks looks at how companies are using metrics such as mean ti...
  16. May 27, 2015
    Cost of Data Breach Grows as does Frequency of Attacks
    High-profile data breaches are a wake-up call to enterprises everywhere. Senior executives can view such episodes as cautionary tales that showcase how the theft, misuse or...
  17. May 25, 2015
    2015 Cost of data breach: Global
    Ponemon Institute is pleased to present its ninth annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. According to the benchmark study of 314 companies spa...
  18. May 7, 2015
    Criminal Attacks: The New Leading Cause of Data Breach in Healthcare
    The Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, sponsored by ID Experts, shows that, for the first time, criminal attacks are the number-one ...
  19. April 27, 2015
    New Ponemon Institute study released: Economic Impact of Mixed Content Warnings on Consumer Behavior
    We have all encountered mixed content warnings that show a visual icon or pop-up that attempts to warn us while visiting a website. A new study by Ponemon Institute, sponso...
  20. April 19, 2015
    A Few Challenges in Calculating Total Cost of a Data Breach Using Insurance Claims Payment Data
    Let me first state that I am a big fan of the Verizon DBIR and have read every one. I also have a great deal of respect for the NetDiligence Cyber Claims Study and like man...
  21. April 16, 2015
    Why Ponemon Institute’s Cost of Data Breach Methodology Is Sound and Endures
    This week, Verizon released its annual 2015 Data Breach Investigations Report. We respect the amount of effort and resources Verizon devotes to its annual report. In the pa...
  22. April 10, 2015
    Ponemon Institute releases new study on how organizations can leapfrog to a stronger cyber security posture
    Is your company’s security strategy stuck in a rut? Are you concerned that the competition is outpacing you in its ability to deal with increasingly sophisticated and...
  23. February 17, 2015
    The Cyber Readiness of Canadian Organizations
    Sponsored by Scalar and independently conducted by Ponemon Institute, the purpose of this research is to study how Canadian organizations are responding to cyber security t...
  24. January 29, 2015
    The Security Impact of Mobile Device Use by Employees
    What do employees think about the use of mobile devices in the workplace? Are they concerned about the security of their devices? Are they aware of potential risks to corpo...
  25. January 28, 2015
    2014: A Year of Mega Breaches 2
    2014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013 and ending with Sony Pictures Entertainment. In...
Scroll to Top

Categories


Tags


Archive

202020192018201720162015201420132012201120102009