- March 5, 20122011 Cost of Data Breach: United KingdomSymantec Corporation and Ponemon Institute are pleased to present 2011 Cost of Data Breach Study: United Kingdom, our fifth annual benchmark study concerning the cost of da...Read More
- March 5, 20122011 Cost of Data Breach: United StatesSymantec Corporation and Ponemon Institute are pleased to present 2011 Cost of Data Breach Study: United States, our seventh annual benchmark study concerning the cost of d...Read More
- March 4, 20122011 Cost of Data Breach: IndiaSymantec Corporation and the Ponemon Institute are pleased to present 2011 Cost of Data Breach: India, our first annual benchmark study concerning the cost of data breach i...Read More
- March 3, 20122011 Cost of Data Breach: FranceSymantec Corporation and the Ponemon Institute are pleased to present 2011 Cost of Data Breach: France, our third annual benchmark study concerning the cost of data breach ...Read More
- March 2, 20122011 Cost of Data Breach: AustraliaSymantec Corporation and the Ponemon Institute are pleased to present 2011 Cost of Data Breach: Australia, our third annual benchmark study concerning the cost of data brea...Read More
- March 2, 20122011 Cost of Data Breach: GermanySymantec Corporation and the Ponemon Institute are pleased to present 2011 Cost of Data Breach Study: Germany, our fourth annual benchmark study concerning the cost of data...Read More
- March 1, 20122011 Cost of Data Breach: JapanSymantec Corporation and the Ponemon Institute are pleased to present 2011 Cost of Data Breach: Japan, our first benchmark study concerning the cost of data breach incident...Read More
- February 27, 2012Future State of IT Security A Survey of IT Security ExecutivesWe are pleased to present the findings of the Future State of IT Security conducted by Ponemon Institute in partnership with RSA® Conference. In this re...Read More
- February 15, 20122011 Global Encryption Trends StudyPonemon Institute is pleased to present the findings of the 2011 Global Encryption Trends Study, sponsored by Thales e-Security. We surveyed 4,140 business and I...Read More
- February 14, 2012Global Study on Mobility Risks Survey Results for: United StatesTo help IT security professionals plan for an increasingly mobile electronic workforce, Websense, Inc. and Ponemon Institute have created this Global Study on Mobility Risk...Read More
- February 13, 2012Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and AdvertisersWe are pleased to present the Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers. The purpose of this research i...Read More
- February 6, 2012The Business Case for Data Protection: What Senior Executives Think about Data ProtectionWhat Senior Executives Think about Data Protection, conducted by Ponemon Institute and sponsored by IBM, was conducted to determine what corporate executives believe a...Read More
- January 12, 2012The Human Factor in Data ProtectionPonemon Institute is pleased to present the results of The Human Factor in Data Protection. Sponsored by Trend Micro, this research focuses on how employees and other ...Read More
- January 9, 2012Aftermath of a Data Breach StudyWe are pleased to present the findings of the Aftermath of a Data Breach conducted by Ponemon Institute and sponsored by Experian® Data Breach Resolution. Th...Read More
- December 1, 2011Second Annual Patient Privacy Study ReleasedWidespread use of mobile devices is putting patient data at risk, according to the latest Ponemon Institute research on healthcare providers' patient privacy practices.Whil...Read More
- December 1, 20112011 Privacy Trust Study for Retail BankingOur study reveals that even among banks with the highest level of consumer trust, it only takes one or two large data breaches to diminish a trusted relationship. Our findi...Read More
- November 4, 2011Best Practices in Data Protection Study ReleasedSponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...Read More
- August 10, 20112011 Second Annual Cost of Cyber Crime Study Benchmark Study of U.S. CompaniesDespite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and governm...Read More
- August 2, 2011Second annual cost of cyber crime study is releasedToday we released our Second Annual Cost of Cyber Crime Study. Our findings support other research studies suggesting increases in the frequency, severity and overall...Read More
- July 31, 2011Most trusted companies for privacyPonemon Institute is releasing our annual Most Trusted Companies for Privacy study this coming week. This is the eighth year that we conducted a U.S. national consume...Read More
- June 10, 2011How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United StatesThe US healthcare industry is undergoing a period of sweeping reforms designed to improve patient care and reduce costs through the adoption of electronic health records th...Read More
- May 2, 2011Ponemon Releases Cloud Service Provider StudyLast week with CA Technologies we issued the results of a study of cloud service providers and their views on cloud security. There has been a lot of interest in this study...Read More
- April 13, 2011State of IT Security: Study of Utilities & Energy CompaniesPonemon Institute is pleased to present the results of State of IT Security: Study of Utilities & Energy Companies. Sponsored by Q1 Labs, the purpose of this research i...Read More
- April 3, 2011Are we taking adequate steps to protect the critical infrastructure?Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...Read More
- March 18, 2011What Auditors Think about Crypto technologiesSponsored by Thales eSecurity(download the study) The purpose of this study was to identify what auditors think abut crypto technologies as it applies to data protection an...Read More
Ponemon Library
Categories
Tags
- Access Governance (2)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (1)
- Application Security (3)
- Authentication Process (1)
- Autonomous Automobile (1)
- Autonomous Car (1)
- Autonomous Vehicle Security (1)
- Best Practices (20)
- Big Data (1)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- BYOID (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (4)
- Communication Inefficiency (1)
- Compliance (9)
- Confidential Data (2)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (2)
- Cryptographic (1)
- Cryptographic Key (1)
- Cryptography (3)
- Cyber Attack (2)
- Cyber Attacks (17)
- Cyber Crime (10)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (2)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (2)
- Cyber Threat (2)
- Data Breach (31)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (4)
- Data Loss (1)
- Data Protection (26)
- Data Risk (1)
- Data Security (15)
- DDoS (2)
- Denial Of Service (1)
- Detection (1)
- Digital Certificate Management (2)
- DLP (2)
- Document-centric Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encrypting Ransomware (1)
- Encryption (5)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (5)
- Explanation Of Benefits (1)
- File Sharing (1)
- Firewall (1)
- Fraud (3)
- Geo-location (1)
- Global Security (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Hidden Threats (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Incident Response (1)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (1)
- Intellectual Property (1)
- Internet Of Things (2)
- IT Architecture (1)
- IT Security (12)
- IT Security Department (2)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (10)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (2)
- Online Banking (1)
- Online Behavioral Advertising (1)
- Online Health Services (1)
- Open Enterprise (1)
- Operational Technology (OT) (1)
- Password (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- PKI (2)
- Post Breach (1)
- Privacy (9)
- Privacy Compliance (1)
- Product security (1)
- Productivity (1)
- Providers (3)
- Ransomware (2)
- Regulated Data (1)
- Remote workforce (1)
- Retail Banking (2)
- Retail Breaches (1)
- RIM Renaissance (2)
- Risk (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk Management (2)
- SaaS (1)
- Security (8)
- Security Innovation (1)
- Security Intelligence (4)
- Security Metrics (1)
- Security operations center (1)
- Security Posture (2)
- Security Professional (1)
- Security Risk (6)
- Security Strategy (1)
- Security Technologies (6)
- Security Threat (2)
- Senior Executives (2)
- SIEM (2)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SQL Injection (2)
- SSO (1)
- Staff (1)
- Supply chain security (1)
- System Glitch (1)
- Technology (3)
- Third Party Risk (4)
- Third-party Ecosystem (2)
- Threat Intelligence (7)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Understaffed (1)
- Vulnerable Code (1)
- Web-based Attacks (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202220212020201920182017201620152014- January (3)
- February (4)
- March (4)
- April (4)
- May (2)
- June (4)
- July (3)
- August (1)
- September (2)
- October (3)
- November (1)