- February 14, 2012Global Study on Mobility Risks Survey Results for: United StatesTo help IT security professionals plan for an increasingly mobile electronic workforce, Websense, Inc. and Ponemon Institute have created this Global Study on Mobility Risk...Read More
- February 6, 2012The Business Case for Data Protection: What Senior Executives Think about Data ProtectionWhat Senior Executives Think about Data Protection, conducted by Ponemon Institute and sponsored by IBM, was conducted to determine what corporate executives believe a...Read More
- January 12, 2012The Human Factor in Data ProtectionPonemon Institute is pleased to present the results of The Human Factor in Data Protection. Sponsored by Trend Micro, this research focuses on how employees and other ...Read More
- January 9, 2012Aftermath of a Data Breach StudyWe are pleased to present the findings of the Aftermath of a Data Breach conducted by Ponemon Institute and sponsored by Experian® Data Breach Resolution. Th...Read More
- December 1, 20112011 Privacy Trust Study for Retail BankingOur study reveals that even among banks with the highest level of consumer trust, it only takes one or two large data breaches to diminish a trusted relationship. Our findi...Read More
- November 4, 2011Best Practices in Data Protection Study ReleasedSponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...Read More
- August 10, 20112011 Second Annual Cost of Cyber Crime Study Benchmark Study of U.S. CompaniesDespite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and governm...Read More
- June 10, 2011How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United StatesThe US healthcare industry is undergoing a period of sweeping reforms designed to improve patient care and reduce costs through the adoption of electronic health records th...Read More
- May 2, 2011Ponemon Releases Cloud Service Provider StudyLast week with CA Technologies we issued the results of a study of cloud service providers and their views on cloud security. There has been a lot of interest in this study...Read More
- April 3, 2011Are we taking adequate steps to protect the critical infrastructure?Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...Read More
- March 8, 2011Cost of a data breach climbs higherMost privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...Read More
- March 7, 2011Listen to a new podcast on the True Cost of Compliance studyDear friends and colleagues, Please listen to a recent podcast on the True Cost of Compliance study completed last month. Martin KcMeay at Network Security Blog did a...Read More
- January 31, 2011Compliance Like a ClubHave you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information secur...Read More
- January 5, 2011The True Cost of Compliance: A Benchmark Study of Multinational OrganizationsTHE COST OF NON-COMPLIANCE CAN BE MORE EXPENSIVE THAN INVESTING IN COMPLIANCE ACTIVITIES While the average cost of compliance for the organizations in our study is $3.5 mil...Read More
- September 30, 2010National Survey on Data Center OutagesPonemon Institute and Emerson Network Power are pleased to present the results of the National Survey on Data Center Outages . The purpose of this study is to determine the...Read More
- July 12, 2010Integrated, Holistic Security StrategiesHolistic is a popular word these days. Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the fun...Read More
- May 13, 2010Think Before you CloudA few years ago, when wireless networking was still relatively new, there were numerous reports of enterprising employees who, frustrated with the pace of new technology in...Read More
- May 3, 2010Fear and Loathing in Online AdvertisingHave you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or ev...Read More
- April 14, 20102010 Security in the TrenchesWe just completed a survey of federal IT security professionals to examine the data protection posture of government agencies. Through the survey, sponsored by CA, we ...Read More
- January 18, 20102010 Access Governance Trends SurveyThis second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...Read More
- November 19, 2009eGov Initiative Not Without Risk to Citizen DataThe eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...Read More
- June 10, 2009More Employees Ignoring Data Security PoliciesDoes it surprise you to learn that, according to our recent study, Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, employee c...Read More
Security
Categories
Tags
- Access Governance (1)
- Access Management (1)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (2)
- Application Security (3)
- Authentication Process (1)
- Best Practices (10)
- Big Data (2)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (2)
- Communication Inefficiency (1)
- Compliance (7)
- Confidential Data (1)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (1)
- Cryptography (2)
- Cyber Attack (1)
- Cyber Attacks (15)
- Cyber Crime (9)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (1)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (1)
- Cyber Threat (2)
- Cybersecurity Risk (1)
- Data Breach (28)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (3)
- Data Loss (1)
- Data Protection (11)
- Data Security (14)
- DDoS (1)
- Denial Of Service (1)
- Digital Certificate Management (1)
- DLP (2)
- Ecommerce Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encryption (4)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (6)
- Explanation Of Benefits (1)
- File Sharing (1)
- Fraud (3)
- Geo-location (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Identity Governance (1)
- Incident Response (2)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (2)
- Intellectual Property (1)
- Internet Of Things (1)
- IT Architecture (1)
- IT Security (10)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- Managed Security Services Providers (1)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mixed Content Warnings (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (9)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- MSSP (1)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (1)
- Online Banking (1)
- Online Health Services (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- Post Breach (1)
- Privacy (8)
- Privacy Compliance (1)
- Privileged Access Management (1)
- Privileged User (1)
- Productivity (1)
- Providers (1)
- Ransomware (1)
- Regulated Data (1)
- Retail Banking (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk To Knowledge Assets (1)
- SaaS (1)
- Safeguard High Value Assets (1)
- Security (6)
- Security Innovation (1)
- Security Intelligence (1)
- Security Posture (1)
- Security Professional (2)
- Security Risk (2)
- Security Strategy (2)
- Security Technologies (2)
- Security Threat (1)
- Senior Executives (2)
- SIEM (1)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SSO (1)
- State Of Endpoint (1)
- System Glitch (1)
- Threat Intelligence (6)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Vulnerable Code (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202020192018201720162015- January (7)
- February (1)
- April (4)
- May (4)
- June (1)
- August (1)
- September (2)
- October (4)
- November (1)
- December (1)
- January (4)
- February (4)
- March (4)
- April (3)
- May (2)
- June (3)
- July (2)
- September (2)
- October (3)
- December (1)
- January (2)
- February (6)
- March (1)
- May (2)
- June (2)
- July (1)
- August (2)
- September (2)
- October (1)
- December (1)