- March 8, 2011Cost of a data breach climbs higherMost privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...Read More
- March 7, 2011Listen to a new podcast on the True Cost of Compliance studyDear friends and colleagues, Please listen to a recent podcast on the True Cost of Compliance study completed last month. Martin KcMeay at Network Security Blog did a...Read More
- February 4, 20112011 Cost of Data Center Outages: Sponsored by Emerson Network PowerThe Cost of Data Center Outages study is the first benchmark study that attempts to estimate the full costs associated with an unplanned data center outage. This benchmark ...Read More
- February 4, 2011Understanding Security Complexity in 21st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & GermanyUnderstanding Security Complexity in 21st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany, sponsored by Check Point Software...Read More
- January 31, 2011Compliance Like a ClubHave you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information secur...Read More
- January 5, 2011The True Cost of Compliance: A Benchmark Study of Multinational OrganizationsTHE COST OF NON-COMPLIANCE CAN BE MORE EXPENSIVE THAN INVESTING IN COMPLIANCE ACTIVITIES While the average cost of compliance for the organizations in our study is $3.5 mil...Read More
- November 9, 2010Poor Privacy Practice is Ailing Healthcare IndustryIt has been more than six years since the ChoicePoint data breach thrust the issue of privacy protection into the headlines. Since then hundreds of information securit...Read More
- October 14, 2010Data Center Outages and Data ManagementI hear the collective sound of our friends, colleagues, and other interested parties scratching their heads at the release of the most recent piece of Ponemon Institute res...Read More
- September 30, 2010National Survey on Data Center OutagesPonemon Institute and Emerson Network Power are pleased to present the results of the National Survey on Data Center Outages . The purpose of this study is to determine the...Read More
- July 15, 2010Information Governance in the CloudJust a brief note to bring our recent webinar to your attention. I presented Information Governance in the Cloud along with the good people at Symantec. Th...Read More
- July 12, 2010Integrated, Holistic Security StrategiesHolistic is a popular word these days. Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the fun...Read More
- July 1, 2010Benchmarking Information Security EfficiencyRecently the Ponemon Institute completed a new project, the Security Efficiency Benchmark Study, the purpose of which was to learn what IT security leaders in the UK and Eu...Read More
- July 1, 2010Benchmarking Information Security EfficiencyRecently the Ponemon Institute completed a new project, the Security Efficiency Benchmark Study, the purpose of which was to learn what IT security leaders in the UK and Eu...Read More
- May 13, 2010Think Before you CloudA few years ago, when wireless networking was still relatively new, there were numerous reports of enterprising employees who, frustrated with the pace of new technology in...Read More
- May 3, 2010Fear and Loathing in Online AdvertisingHave you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or ev...Read More
- April 19, 2010The Road to Data Breach is Paved with Good IntentionsWe recently completed some new research with Accenture in which we were surprised to find that, in spite of all the attention being paid to data protection, and in spite of...Read More
- April 17, 2010Economic Impact of Privacy on Online Behavioral AdvertisingIndependent Ponemon Institute research looks into the controversial behavioral advertising industry to understand from marketers their experience with the medium’s su...Read More
- April 14, 20102010 Security in the TrenchesWe just completed a survey of federal IT security professionals to examine the data protection posture of government agencies. Through the survey, sponsored by CA, we ...Read More
- February 17, 2010How Global Organizations Approach the Challenge of Protecting Personal DataHow data privacy perceptions and practices around the globe inform and influence data protection practices. More than 5,500 business leaders were surveyed....Read More
- February 17, 2010Making Web 2.0 WorkPonemon Institute with sponsorship from IBM conducted a study of Web 2.0 users in the US, Brazil, Russian Federation, People's Republic of China, Singapore, Sweden and Germ...Read More
- January 18, 20102010 Access Governance Trends SurveyThis second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...Read More
- December 10, 2009Training Is the Strongest LinkToday we held a RIM College event featuring three noted experts in corporate privacy training programs -- namely, Dean Forbes (Merck), Bob Posch (Merck) and John Block (Med...Read More
- December 5, 2009Sophos & Ponemon Institute Announces New StudyWe are pleased to present The State of Privacy and Data Security Compliance study conducted by Ponemon Institute and sponsored by Sophos. The purpose of the study is to det...Read More
- November 21, 2009Crowe Horwath & Ponemon release HITECH studyI am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 7...Read More
- November 19, 2009eGov Initiative Not Without Risk to Citizen DataThe eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...Read More
Ponemon Library
Categories
Tags
- Access Governance (2)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (1)
- Application Security (3)
- Authentication Process (1)
- Autonomous Automobile (1)
- Autonomous Car (1)
- Autonomous Vehicle Security (1)
- Best Practices (20)
- Big Data (1)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- BYOID (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (4)
- Communication Inefficiency (1)
- Compliance (9)
- Confidential Data (2)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (2)
- Cryptographic (1)
- Cryptographic Key (1)
- Cryptography (3)
- Cyber Attack (2)
- Cyber Attacks (17)
- Cyber Crime (10)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (2)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (2)
- Cyber Threat (2)
- Data Breach (31)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (4)
- Data Loss (1)
- Data Protection (26)
- Data Risk (1)
- Data Security (15)
- DDoS (2)
- Denial Of Service (1)
- Detection (1)
- Digital Certificate Management (2)
- DLP (2)
- Document-centric Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encrypting Ransomware (1)
- Encryption (5)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (5)
- Explanation Of Benefits (1)
- File Sharing (1)
- Firewall (1)
- Fraud (3)
- Geo-location (1)
- Global Security (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Hidden Threats (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Incident Response (1)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (1)
- Intellectual Property (1)
- Internet Of Things (2)
- IT Architecture (1)
- IT Security (12)
- IT Security Department (2)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (10)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (2)
- Online Banking (1)
- Online Behavioral Advertising (1)
- Online Health Services (1)
- Open Enterprise (1)
- Operational Technology (OT) (1)
- Password (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- PKI (2)
- Post Breach (1)
- Privacy (9)
- Privacy Compliance (1)
- Product security (1)
- Productivity (1)
- Providers (3)
- Ransomware (2)
- Regulated Data (1)
- Remote workforce (1)
- Retail Banking (2)
- Retail Breaches (1)
- RIM Renaissance (2)
- Risk (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk Management (2)
- SaaS (1)
- Security (8)
- Security Innovation (1)
- Security Intelligence (4)
- Security Metrics (1)
- Security operations center (1)
- Security Posture (2)
- Security Professional (1)
- Security Risk (6)
- Security Strategy (1)
- Security Technologies (6)
- Security Threat (2)
- Senior Executives (2)
- SIEM (2)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SQL Injection (2)
- SSO (1)
- Staff (1)
- Supply chain security (1)
- System Glitch (1)
- Technology (3)
- Third Party Risk (4)
- Third-party Ecosystem (2)
- Threat Intelligence (7)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Understaffed (1)
- Vulnerable Code (1)
- Web-based Attacks (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202220212020201920182017201620152014- January (3)
- February (4)
- March (4)
- April (4)
- May (2)
- June (4)
- July (3)
- August (1)
- September (2)
- October (3)
- November (1)