Ponemon Library

  1. May 19, 2016
    Tone at the Top and Third Party Risk
    Ponemon Institute is pleased to announce the release of Tone at the Top and Third Party Risk, sponsored by Shared Assessments. The purpose of this study is to understand th...
  2. May 12, 2016
    Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data
    We are pleased to announce the release of the Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, sponsored by ID Experts. For the sixth year in a ro...
  3. May 12, 2016
    Nearly 90 Percent of Healthcare Organizations Suffer Data Breaches, New Ponemon Study Shows
    Criminal attacks from the outside and negligence from the inside continue to put patient data in the crossfire, the newly released Sixth Annual Benchmark Study on Privacy &...
  4. March 18, 2016
    New Ponemon Study on Malware Detection & Prevention Released
    The State of Malware Detection & Prevention sponsored by Cyphort reveals the difficulty of preventing and detecting malware and advanced threats. The IT function also s...
  5. March 16, 2016
    The State of Malware Detection & Prevention
    We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty of preventing and detecting...
  6. March 2, 2016
    2016 Global Encryption Trends Study
    Ponemon Institute is pleased to present the findings of the 2016 Global Trends Study, sponsored by Thales e-Security. We surveyed 5,009 individuals across multiple industry...
  7. February 22, 2016
    How Much Is the Data on Your Mobile Device Worth?
    The purpose of this research, sponsored by Lookout, is to understand the value of the data we access and store on our mobile devices and if we are doing enough to protect t...
  8. February 17, 2016
    Flipping the Economics of Attacks
    In Flipping the Economics of Attacks, we look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwar...
  9. February 5, 2016
    The Cyber Resilient Organization in Germany: Learning to Thrive against Threats
    Ponemon Institute, with sponsorship from Resilient Systems, surveyed 445 IT and IT security practitioners in Germany about their organizations’ approach to becoming r...
  10. February 4, 2016
    The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats
    Ponemon Institute, with sponsorship from Resilient Systems, surveyed 450 IT and IT security practitioners in the United Kingdom about their organisations’ approach to...
  11. January 19, 2016
    2016 Cost of Data Center Outages
    Ponemon Institute and Emerson Network Power are pleased to present the results of the 2016 Cost of Data Center Outages. Previously conducted in 2010 and 2013, the purpose o...
  12. December 21, 2015
    Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way
    The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way reveals interesting trends in how organizations are participating in initiativ...
  13. November 4, 2015
    The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way
    We are pleased to let you know about our latest study on intelligence sharing. The Second Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way...
  14. October 23, 2015
    The Rise of Nation State Attacks
    The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation st...
  15. October 9, 2015
    2015 Cost of Cyber Crime Study: United States
    We are pleased to present the 2015 Cost of Cyber Crime Study: United States, the sixth annual study of US companies.  Sponsored by Hewlett Packard Enterprise, this yea...
  16. October 9, 2015
    The State of Cybersecurity in Local, State and Federal Government
    Sponsored by Hewlett Packard Enterprise and independently conducted by Ponemon Institute, the purpose of this research is to learn the challenges IT and IT security practit...
  17. September 18, 2015
    The Cyber Resilient Organization: Learning to Thrive against Threats
    Ponemon Institute, with sponsorship from Resilient Systems, surveyed 623 IT and IT security practitioners about their organizations’ approach to becoming resilient to...
  18. May 28, 2015
    Ponemon Institute Releases New Study on the Efforts of Retail Companies and Financial Services to Improve the Time to Detect and Contain Advanced Threats
    Advanced Threats in Financial Services and Retail: A Study of North America & EMEA, sponsored by Arbor Networks looks at how companies are using metrics such as mean ti...
  19. May 27, 2015
    Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data
    The Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data reveals that the majority of healthcare organizations represented in this study have experienc...
  20. May 25, 2015
    2015 Cost of data breach: Global
    Ponemon Institute is pleased to present its ninth annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. According to the benchmark study of 314 companies spa...
  21. May 7, 2015
    Criminal Attacks: The New Leading Cause of Data Breach in Healthcare
    The Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, sponsored by ID Experts, shows that, for the first time, criminal attacks are the number-one ...
  22. April 10, 2015
    Ponemon Institute releases new study on how organizations can leapfrog to a stronger cyber security posture
    Is your company’s security strategy stuck in a rut? Are you concerned that the competition is outpacing you in its ability to deal with increasingly sophisticated and...
  23. February 17, 2015
    The Cyber Readiness of Canadian Organizations
    Sponsored by Scalar and independently conducted by Ponemon Institute, the purpose of this research is to study how Canadian organizations are responding to cyber security t...
  24. January 29, 2015
    The Security Impact of Mobile Device Use by Employees
    What do employees think about the use of mobile devices in the workplace? Are they concerned about the security of their devices? Are they aware of potential risks to corpo...
  25. January 28, 2015
    2014: A Year of Mega Breaches
    2014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013 and ending with Sony Pictures Entertainment. In...
Scroll to Top

Categories


Tags


Archive

2021202020182017201620152014201320122011201020092008