Ponemon Library

  1. January 23, 2014
    Risks & Rewards of Online & Mobile Health Services: Consumer Attitudes Explored
    Sponsored by Experian® Data Breach Resolution, Risks & Rewards of Online & Mobile Health Services: Consumer Attitudes Explored, examines consumers’ perceptio...
  2. January 21, 2014
    Cyber Security Incident Response: Are We as Prepared as We Think?
    Why is the CEO the last to know if the company had a cyber attack? According to the IT experts in our latest study, only 20 percent say they have regular communication with th...
  3. December 18, 2013
    2013 Cost of Data Center Outages
    Ponemon Institute and Emerson Network Power are pleased to present the results of the 2013 Cost of Data Center Outages. First conducted in 2010, the purpose of this benchmark...
  4. November 19, 2013
    2013 Cybersecurity Salary Benchmarking Report
    The 2013 Cybersecurity Salary Benchmarking Report is now available. The number one reason security professionals leave an organization is due to compensation. Security teams a...
  5. October 23, 2013
    Most Trusted Retail Banks for Privacy
    The 2013 study represents the tenth year Ponemon Institute has conducted its Privacy Trust Study for Retail Banking. This annual survey-based research series asks consumers to...
  6. September 19, 2013
    2013 Survey on Medical Identity Thef
    The 2013 Survey on Medical Identity Theft conducted by Ponemon Institute and sponsored by the Medical Identity Fraud Alliance (MIFA), with support from ID Experts, measures th...
  7. September 11, 2013
    2013 Survey on Medical Identity Theft
    We are pleased to announce the release of our 2013 Survey on Medical Identity Theft. This is the fourth year of the study and as in previous years we find that medical identit...
  8. August 23, 2013
    Live Threat Intelligence Impact Report 2013
    Slow and weak threat intelligence can keep companies from defending against security compromises, breaches and exploits. According to the findings, if actionable intelligence...
  9. August 22, 2013
    Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
    We are pleased to announce the release of a new study, Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age. With the increasing cost and volume of d...
  10. July 26, 2013
    Live Threat Intelligence Impact Report 2013
    We are pleased to announce the release of a new study, Live Threat Intelligence Impact Report 2013, that reveals the facts behind the impact that weak intelligence can have on...
  11. June 27, 2013
    The Risk of Regulated Data on Mobile Devices & in the Cloud
    We are pleased to announce the release of a new Ponemon Institute study sponsored by WatchDox. If you ever worry about an employee downloading confidential, regulated data on...
  12. June 25, 2013
    The State of Risk Based Security Management
    Ponemon Institute and Tripwire continue to study the state of risk-based security management. This annual study is conducted to understand the level of maturity of RBSM. In th...
  13. May 28, 2013
    2013 Cost of Data Breach: Global Analysis
    We are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located i...
  14. May 8, 2013
    The Economic & Productivity Impact of IT Security on Healthcare
    We are pleased to present the results from The Economic & Productivity Impact of IT Security on Healthcare study, sponsored by Imprivata.  While the implementation of...
  15. April 17, 2013
    Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers
    We are pleased to present the results from Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers. In this...
  16. March 5, 2013
    Security of Cloud Computing Users 2013 Study
    Today we are releasing a very interesting follow up study on how organizations are improving--or not--their cloud security practices. The Security of Cloud Computing Users stu...
  17. February 28, 2013
    Risk of Insider Fraud: Second Annual Study
    Today we released a new study entitled the Risk of Insider Fraud: Second Annual Study . The research reveals that the number of employee-related incidents of fraud continues t...
  18. February 26, 2013
    The Post Breach Boom
    Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some poi...
  19. February 25, 2013
    Big Data Analytics in Cyber Defense
    The purpose of the Big Data Analytics in Cyber Defense study sponsored by Teradata and conducted by Ponemon Institute is to learn about organizations’ cyber se...
  20. February 21, 2013
    Understanding the Methodology and Staggering Costs in the Annual Cost of Failed Trust Report
    Some staggering numbers Every Global 2000 enterprise faces a total exposure of almost U.S. $400 million over 24 months due to new and evolving attacks on failed cryptographic...
  21. February 13, 2013
    The Post Breach Boom
    Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and...
  22. January 28, 2013
    2012 Most Trusted Companies for Privacy
    Do we still care about privacy? According to our annual study on privacy trust, more and more of us do care. Our biggest privacy concerns are the fear of identity theft and go...
  23. January 28, 2013
    2012 Most Trusted Companies for Privacy
    We are pleased to present the results from the 2012 Most Trusted Companies for Privacy study.  This is an objective study that asks consumers to name and rate organizatio...
  24. December 6, 2012
    Third Annual Patient Privacy & Data Security Study Released
    Could BYOD increase the risks of a healthcare data breach and medical identity theft? The third annual study on Patient Privacy and Data Security reveals the explosion of mobi...
  25. December 6, 2012
    Third Annual Patient Privacy & Data Security Study
    Healthcare organizations seem to face an uphill battle in their efforts to stop and reduce the loss or theft of protected health information (PHI) or patient information. As i...
Scroll to Top

Categories


Tags


Archive

20182017201620152014201320122011201020092008