Ponemon Library

close Data Protection
Results
  1. January 22, 2015
    2014: A Year of Mega Breaches
    Ponemon Institute, with sponsorship from Identity Finder, conducted 2014: A Year of Mega Breaches to understand if and how organizations have changed their data protection pra...
  2. June 27, 2013
    The Risk of Regulated Data on Mobile Devices & in the Cloud
    We are pleased to announce the release of a new Ponemon Institute study sponsored by WatchDox. If you ever worry about an employee downloading confidential, regulated data on...
  3. February 6, 2012
    The Business Case for Data Protection: What Senior Executives Think about Data Protection
    What Senior Executives Think about Data Protection, conducted by Ponemon Institute and sponsored by IBM, was conducted to determine what corporate executives believe are...
  4. January 12, 2012
    The Human Factor in Data Protection
    Ponemon Institute is pleased to present the results of The Human Factor in Data Protection. Sponsored by Trend Micro, this research focuses on how employees and other ins...
  5. January 9, 2012
    Aftermath of a Data Breach Study
    We are pleased to present the findings of the Aftermath of a Data Breach  conducted by Ponemon Institute and sponsored by Experian® Data Breach Resolution. The s...
  6. November 4, 2011
    Best Practices in Data Protection Study Released
    Sponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this study i...
  7. July 31, 2011
    Most trusted companies for privacy
    Ponemon Institute is releasing our annual Most Trusted Companies for Privacy study this coming week.  This is the eighth year that we conducted a U.S. national consumer s...
  8. April 3, 2011
    Are we taking adequate steps to protect the critical infrastructure?
    Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research reve...
  9. March 18, 2011
    What Auditors Think about Crypto technologies
    Sponsored by Thales eSecurity(download the study) The purpose of this study was to identify what auditors think abut crypto technologies as it applies to data protection and c...
  10. March 8, 2011
    Cost of a data breach climbs higher
    Most privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat immu...
  11. November 9, 2010
    Poor Privacy Practice is Ailing Healthcare Industry
    It has been more than six years since the ChoicePoint data breach thrust the issue of privacy protection into the headlines. Since then hundreds of information security f...
  12. October 14, 2010
    Data Center Outages and Data Management
    I hear the collective sound of our friends, colleagues, and other interested parties scratching their heads at the release of the most recent piece of Ponemon Institute resear...
  13. July 1, 2010
    Benchmarking Information Security Efficiency
    Recently the Ponemon Institute completed a new project, the Security Efficiency Benchmark Study, the purpose of which was to learn what IT security leaders in the UK and Europ...
  14. July 1, 2010
    Benchmarking Information Security Efficiency
    Recently the Ponemon Institute completed a new project, the Security Efficiency Benchmark Study, the purpose of which was to learn what IT security leaders in the UK and Europ...
  15. April 17, 2010
    Economic Impact of Privacy on Online Behavioral Advertising
    Independent Ponemon Institute research looks into the controversial behavioral advertising industry to understand from marketers their experience with the medium’s succe...
  16. April 14, 2010
    2010 Security in the Trenches
    We just completed a survey of federal IT security professionals to examine the data protection posture of government agencies. Through the survey, sponsored by CA, we wan...
  17. February 17, 2010
    How Global Organizations Approach the Challenge of Protecting Personal Data
    How data privacy perceptions and practices around the globe inform and influence data protection practices. More than 5,500 business leaders were surveyed....
  18. January 18, 2010
    2010 Access Governance Trends Survey
    This second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practices...
  19. December 10, 2009
    Training Is the Strongest Link
    Today we held a RIM College event featuring three noted experts in corporate privacy training programs -- namely, Dean Forbes (Merck), Bob Posch (Merck) and John Block (Media...
  20. December 5, 2009
    Sophos & Ponemon Institute Announces New Study
    We are pleased to present The State of Privacy and Data Security Compliance study conducted by Ponemon Institute and sponsored by Sophos. The purpose of the study is to determ...
  21. November 21, 2009
    Crowe Horwath & Ponemon release HITECH study
    I am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 77 p...
  22. November 19, 2009
    eGov Initiative Not Without Risk to Citizen Data
    The eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a hi...
  23. August 31, 2009
    The Goal is Credibility
    I want to share an article with you that I think has a tremendous lesson for anyone in the business of building trust.  The article is from a recent edition of Foreign Po...
  24. July 21, 2009
    Archer-Ponemon Treaty for Data Governance
    I’m still processing a lot of the information gathered, shared, and created during our 8th RIM Renaissance this past weekend in Minneapolis. One of our sessions foc...
  25. July 14, 2009
    What We have here is, Failure to Communicate
    Privacy pro: Do you ever feel like you are working overtime to meet overly ambitious expectations? Are you frustrated by your attempts to outline a plan for protecting se...
Scroll to Top

Categories


Tags


Archive

20182017201620152014201320122011201020092008