Ponemon Library

  1. September 15, 2014
    Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness
    With data breaches making headlines the world over, awareness about the importance of havingtechnologies and governance practices in place to respond to such incidents should...
  2. August 12, 2014
    The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID)
    Ponemon Institute is pleased to release the findings of The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (...
  3. July 30, 2014
    HSM Global Market Study
    Ponemon Institute is pleased to present the HSM Global Market Study sponsored by HP Atalla. The purpose of this research is to provide a competitive analysis of the hardware s...
  4. July 28, 2014
    The Imprivata Report on the Economic Impact of Inefficient Communications in Healthcare
    Efficient communication and collaboration amongst physicians, nurses and other providers is critical to the coordination and delivery of patient care, especially given the inc...
  5. July 7, 2014
    The SQL Injection Threat & Recent Retail Breaches
    Ponemon Institute is pleased to present its second report on the SQL injection threat, sponsored by DB Networks. In this report, we explore what IT security professionals thin...
  6. June 16, 2014
    Global Insights on Document Security
    Ponemon Institute is pleased to present the results of Global Insights on Document Security, sponsored by Adobe. The purpose of this research is to understand the challenges c...
  7. June 5, 2014
    Can a data breach in the cloud result in a larger and more costly incident?
    Can a data breach in the cloud result in a larger and more costly incident? Our latest study, Data Breach: The Cloud Multiplier Effect sponsored by Netskope reveals how the ri...
  8. June 2, 2014
    2014 Cost of Data Breach: United States
    IBM and Ponemon Institute are pleased to present the 2014 Cost of Data Breach Study: United States, our ninth annual benchmark study on the cost of data breach incidents for c...
  9. June 1, 2014
    2014 Cost of Data Breach: Global
    Ponemon Institute released its ninth annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. According to the benchmark study of 314 companies spanning 10 countri...
  10. May 7, 2014
    The SQL Injection Threat Study
    Ponemon Institute is pleased to present the findings of The SQL Injection Threat Study sponsored by DB Networks.  The purpose of this research is to understand how organi...
  11. May 5, 2014
    Ponemon Institute Releases 2014 Cost of Data Breach: Global Analysis
    Throughout the world, companies are finding that data breaches have become as common as a cold but far more expensive to treat. With the exception of Germany, companies had to...
  12. April 21, 2014
    Security Metrics to Manage Change: Which Matter, Which Can Be Measured?
    Ponemon Institute is pleased to present the findings of Security Metrics to Manage Change: Which Matter, Which Can Be Measured? sponsored by FireMon. The purpose of this resea...
  13. April 17, 2014
    Cyber Strategies for Endpoint Defense 2014
    Ponemon Institute is pleased to present the results of Cyber Strategies for Endpoint Defense 2014, sponsored by Avecto. The purpose of this research is to understand the strat...
  14. April 16, 2014
    The Aftermath of a Data Breach: Consumer Sentiment
    Data breaches are in the headlines and on the minds of both businesses and consumers. While much of the dialog has been driven by companies that experienced a data breach, thi...
  15. April 7, 2014
    The Cost of Insecure Mobile Devices in the Workplace
    Sponsored by AT&T, we are pleased to present the findings of The Cost of Insecure Mobile Devices in the Workplace. The study focuses on the risk created by employees&rsquo...
  16. March 26, 2014
    Fourth Annual Benchmark Study on Patient Privacy & Data Security
    The Fourth Annual Study on Patient Privacy & Data Security, sponsored by ID Experts, reveals new and expanded threats to the security and privacy of patient informati...
  17. March 14, 2014
    Unlocking the Mobile Security Potential: The Key to Effective Two-Factor Authentication
    An important security issue for many companies is the authentication of users using mobile devices for transactions. Unlocking the Mobile Security Potential: The Key to Effect...
  18. March 12, 2014
    Fourth Annual Benchmark Study on Patient Privacy and Data Security
    Today we are releasing our Fourth Annual Benchmark Study on Patient Privacy and Data Security. We hope you will read the report sponsored by ID Experts that reveals some fasci...
  19. March 7, 2014
    Thales e-Security and Ponemon Institute collaborate to produce 2013 Global Encryption Trends Study
    This past February, Thales e-Security released the publication of its latest 2013 Global Encryption Trends Study. The report, based on independent research by the Ponemon Inst...
  20. February 28, 2014
    2014 Best Schools For Cybersecurity
    Ponemon Institute’s research has also consistently revealed that one of the major barriers to achieving a strong security posture is the dearth of trained and skilled se...
  21. February 24, 2014
    Understaffed and at Risk: Today’s IT Security Department
    One of the biggest barriers to a strong security posture, according to Ponemon Institute research, is having a team of security professionals who can deal with complex and ser...
  22. February 19, 2014
    Threat Intelligence & Incident Response: A Study of U.S and EMEA Organizations
    Sponsored by AccessData, we are pleased to present the findings of Threat Intelligence & Incident Response: A Study of U.S and EMEA Organizations. The complete report is a...
  23. February 4, 2014
    The Impact of IT Transformation on Enterprise Computing
    We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by the Logicalis Corporation and HP.  The objective of this re...
  24. January 29, 2014
    Achieving Security in Workplace File Sharing
    Sponsored by Axway Corporation, we are pleased to present the findings of Achieving Security in Workplace File Sharing.  The study focuses on the practice of public cloud...
  25. January 27, 2014
    Cyber Security Incident Response: Are we as prepared as we think?
    We are please to present Cyber Security Incident Response: Are we as prepared as we think?, sponsored by Lancope. In this study, we surveyed 674 IT and IT security professiona...
Scroll to Top

Categories


Tags


Archive

20182017201620152014201320122011201020092008