Ponemon Library

  1. April 17, 2014
    Cyber Strategies for Endpoint Defense 2014
    Ponemon Institute is pleased to present the results of Cyber Strategies for Endpoint Defense 2014, sponsored by Avecto. The purpose of this research is to understand the st...
  2. April 16, 2014
    The Aftermath of a Data Breach: Consumer Sentiment
    Data breaches are in the headlines and on the minds of both businesses and consumers. While much of the dialog has been driven by companies that experienced a data breach, ...
  3. April 7, 2014
    The Cost of Insecure Mobile Devices in the Workplace
    Sponsored by AT&T, we are pleased to present the findings of The Cost of Insecure Mobile Devices in the Workplace. The study focuses on the risk created by employees&rs...
  4. March 26, 2014
    Fourth Annual Benchmark Study on Patient Privacy & Data Security
    The Fourth Annual Study on Patient Privacy & Data Security, sponsored by ID Experts, reveals new and expanded threats to the security and privacy of patient inform...
  5. March 14, 2014
    Unlocking the Mobile Security Potential: The Key to Effective Two-Factor Authentication
    An important security issue for many companies is the authentication of users using mobile devices for transactions. Unlocking the Mobile Security Potential: The Key to Eff...
  6. March 12, 2014
    Fourth Annual Benchmark Study on Patient Privacy and Data Security
    Today we are releasing our Fourth Annual Benchmark Study on Patient Privacy and Data Security. We hope you will read the report sponsored by ID Experts that reveals some fa...
  7. March 7, 2014
    Thales e-Security and Ponemon Institute collaborate to produce 2013 Global Encryption Trends Study
    This past February, Thales e-Security released the publication of its latest 2013 Global Encryption Trends Study. The report, based on independent research by the Ponemon I...
  8. February 28, 2014
    2014 Best Schools For Cybersecurity
    Ponemon Institute’s research has also consistently revealed that one of the major barriers to achieving a strong security posture is the dearth of trained and skilled...
  9. February 24, 2014
    Understaffed and at Risk: Today’s IT Security Department
    One of the biggest barriers to a strong security posture, according to Ponemon Institute research, is having a team of security professionals who can deal with complex and ...
  10. February 19, 2014
    Threat Intelligence & Incident Response: A Study of U.S and EMEA Organizations
    Sponsored by AccessData, we are pleased to present the findings of Threat Intelligence & Incident Response: A Study of U.S and EMEA Organizations. The complete report i...
  11. February 4, 2014
    The Impact of IT Transformation on Enterprise Computing
    We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by the Logicalis Corporation and HP.  The objective of this...
  12. January 29, 2014
    Achieving Security in Workplace File Sharing
    Sponsored by Axway Corporation, we are pleased to present the findings of Achieving Security in Workplace File Sharing.  The study focuses on the practice of public cl...
  13. January 23, 2014
    Risks & Rewards of Online & Mobile Health Services: Consumer Attitudes Explored
    Sponsored by Experian® Data Breach Resolution, Risks & Rewards of Online & Mobile Health Services: Consumer Attitudes Explored, examines consumers’ percep...
  14. January 21, 2014
    Cyber Security Incident Response: Are We as Prepared as We Think?
    Why is the CEO the last to know if the company had a cyber attack? According to the IT experts in our latest study, only 20 percent say they have regular communication with...
  15. December 18, 2013
    2013 Cost of Data Center Outages
    Ponemon Institute and Emerson Network Power are pleased to present the results of the 2013 Cost of Data Center Outages. First conducted in 2010, the purpose of this benchma...
  16. November 19, 2013
    2013 Cybersecurity Salary Benchmarking Report
    The 2013 Cybersecurity Salary Benchmarking Report is now available. The number one reason security professionals leave an organization is due to compensation. Security team...
  17. October 23, 2013
    Most Trusted Retail Banks for Privacy
    The 2013 study represents the tenth year Ponemon Institute has conducted its Privacy Trust Study for Retail Banking. This annual survey-based research series asks consumers...
  18. September 19, 2013
    2013 Survey on Medical Identity Thef
    The 2013 Survey on Medical Identity Theft conducted by Ponemon Institute and sponsored by the Medical Identity Fraud Alliance (MIFA), with support from ID Experts, measures...
  19. September 11, 2013
    2013 Survey on Medical Identity Theft
    We are pleased to announce the release of our 2013 Survey on Medical Identity Theft. This is the fourth year of the study and as in previous years we find that medical iden...
  20. August 23, 2013
    Live Threat Intelligence Impact Report 2013
    Slow and weak threat intelligence can keep companies from defending against security compromises, breaches and exploits. According to the findings, if actionable intelligen...
  21. August 22, 2013
    Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
    We are pleased to announce the release of a new study, Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age. With the increasing cost and volume o...
  22. July 26, 2013
    Live Threat Intelligence Impact Report 2013
    We are pleased to announce the release of a new study, Live Threat Intelligence Impact Report 2013, that reveals the facts behind the impact that weak intelligence can have...
  23. June 27, 2013
    The Risk of Regulated Data on Mobile Devices & in the Cloud
    We are pleased to announce the release of a new Ponemon Institute study sponsored by WatchDox. If you ever worry about an employee downloading confidential, regulated data ...
  24. June 25, 2013
    The State of Risk Based Security Management
    Ponemon Institute and Tripwire continue to study the state of risk-based security management. This annual study is conducted to understand the level of maturity of RBSM. In...
  25. May 28, 2013
    2013 Cost of Data Breach: Global Analysis
    We are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies locate...
Scroll to Top

Categories


Tags


Archive

202220212020201920182017201620152014201320122011201020092008