Results
- January 29, 2015The Security Impact of Mobile Device Use by EmployeesWhat do employees think about the use of mobile devices in the workplace? Are they concerned about the security of their devices? Are they aware of potential risks to corpo...Read More
- January 28, 20152014: A Year of Mega Breaches2014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013 and ending with Sony Pictures Entertainment. In...Read More
- January 28, 2015Ponemon Institute Announces Results of 2014 Most Trusted Companies for Privacy StudyIn recognition of Data Privacy Day, Ponemon Institute is pleased to announce the results of the 2014 Most Trusted Companies for Privacy Study, an annual study that tracks c...Read More
- January 26, 2015The Cost of Malware ContainmentPonemon Institute is pleased to present the findings of The Cost of Malware Containment sponsored by Damballa. Ponemon Institute conducted this research to understand how m...Read More
- January 22, 20152014: A Year of Mega BreachesPonemon Institute, with sponsorship from Identity Finder, conducted 2014: A Year of Mega Breaches to understand if and how organizations have changed their data protection ...Read More
- January 14, 20152015 State of the Endpoint Report: User-Centric RiskPonemon Institute and Lumension are pleased to present the results from the 2015 State of the Endpoint Report: User-Centric Risk. The purpose of this study is to understand...Read More