Security

  1. February 14, 2012
    Global Study on Mobility Risks Survey Results for: United States
    To help IT security professionals plan for an increasingly mobile electronic workforce, Websense, Inc. and Ponemon Institute have created this Global Study on Mobility Risk...
  2. February 6, 2012
    The Business Case for Data Protection: What Senior Executives Think about Data Protection
    What Senior Executives Think about Data Protection, conducted by Ponemon Institute and sponsored by IBM, was conducted to determine what corporate executives believe a...
  3. January 12, 2012
    The Human Factor in Data Protection
    Ponemon Institute is pleased to present the results of The Human Factor in Data Protection. Sponsored by Trend Micro, this research focuses on how employees and other ...
  4. January 9, 2012
    Aftermath of a Data Breach Study
    We are pleased to present the findings of the Aftermath of a Data Breach  conducted by Ponemon Institute and sponsored by Experian® Data Breach Resolution. Th...
  5. December 1, 2011
    2011 Privacy Trust Study for Retail Banking
    Our study reveals that even among banks with the highest level of consumer trust, it only takes one or two large data breaches to diminish a trusted relationship. Our findi...
  6. November 4, 2011
    Best Practices in Data Protection Study Released
    Sponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...
  7. August 10, 2011
    2011 Second Annual Cost of Cyber Crime Study Benchmark Study of U.S. Companies
    Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and governm...
  8. June 10, 2011
    How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States
    The US healthcare industry is undergoing a period of sweeping reforms designed to improve patient care and reduce costs through the adoption of electronic health records th...
  9. May 2, 2011
    Ponemon Releases Cloud Service Provider Study
    Last week with CA Technologies we issued the results of a study of cloud service providers and their views on cloud security. There has been a lot of interest in this study...
  10. April 3, 2011
    Are we taking adequate steps to protect the critical infrastructure?
    Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...
  11. March 8, 2011
    Cost of a data breach climbs higher
    Most privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...
  12. March 7, 2011
    Listen to a new podcast on the True Cost of Compliance study
    Dear friends and colleagues, Please listen to a recent podcast on the True Cost of Compliance study completed last month.  Martin KcMeay at Network Security Blog did a...
  13. January 31, 2011
    Compliance Like a Club
    Have you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information secur...
  14. January 5, 2011
    The True Cost of Compliance: A Benchmark Study of Multinational Organizations
    THE COST OF NON-COMPLIANCE CAN BE MORE EXPENSIVE THAN INVESTING IN COMPLIANCE ACTIVITIES While the average cost of compliance for the organizations in our study is $3.5 mil...
  15. September 30, 2010
    National Survey on Data Center Outages
    Ponemon Institute and Emerson Network Power are pleased to present the results of the National Survey on Data Center Outages . The purpose of this study is to determine the...
  16. July 12, 2010
    Integrated, Holistic Security Strategies
    Holistic is a popular word these days. Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the fun...
  17. May 13, 2010
    Think Before you Cloud
    A few years ago, when wireless networking was still relatively new, there were numerous reports of enterprising employees who, frustrated with the pace of new technology in...
  18. May 3, 2010
    Fear and Loathing in Online Advertising
    Have you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or ev...
  19. April 14, 2010
    2010 Security in the Trenches
    We just completed a survey of federal IT security professionals to examine the data protection posture of government agencies. Through the survey, sponsored by CA, we ...
  20. January 18, 2010
    2010 Access Governance Trends Survey
    This second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...
  21. November 19, 2009
    eGov Initiative Not Without Risk to Citizen Data
    The eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...
  22. June 10, 2009
    More Employees Ignoring Data Security Policies
    Does it surprise you to learn that, according to our recent study, Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, employee c...
Scroll to Top

Categories


Tags


Archive

202020192018201720162015201420132012201120102009