Ponemon Library

close Data Protection
Results
  1. January 22, 2015
    2014: A Year of Mega Breaches
    Ponemon Institute, with sponsorship from Identity Finder, conducted 2014: A Year of Mega Breaches to understand if and how organizations have changed their data protection ...
  2. June 27, 2013
    The Risk of Regulated Data on Mobile Devices & in the Cloud
    We are pleased to announce the release of a new Ponemon Institute study sponsored by WatchDox. If you ever worry about an employee downloading confidential, regulated data ...
  3. February 6, 2012
    The Business Case for Data Protection: What Senior Executives Think about Data Protection
    What Senior Executives Think about Data Protection, conducted by Ponemon Institute and sponsored by IBM, was conducted to determine what corporate executives believe a...
  4. January 12, 2012
    The Human Factor in Data Protection
    Ponemon Institute is pleased to present the results of The Human Factor in Data Protection. Sponsored by Trend Micro, this research focuses on how employees and other ...
  5. January 9, 2012
    Aftermath of a Data Breach Study
    We are pleased to present the findings of the Aftermath of a Data Breach  conducted by Ponemon Institute and sponsored by Experian® Data Breach Resolution. Th...
  6. November 4, 2011
    Best Practices in Data Protection Study Released
    Sponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...
  7. July 31, 2011
    Most trusted companies for privacy
    Ponemon Institute is releasing our annual Most Trusted Companies for Privacy study this coming week.  This is the eighth year that we conducted a U.S. national consume...
  8. April 3, 2011
    Are we taking adequate steps to protect the critical infrastructure?
    Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...
  9. March 18, 2011
    What Auditors Think about Crypto technologies
    Sponsored by Thales eSecurity(download the study) The purpose of this study was to identify what auditors think abut crypto technologies as it applies to data protection an...
  10. March 8, 2011
    Cost of a data breach climbs higher
    Most privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...
  11. November 9, 2010
    Poor Privacy Practice is Ailing Healthcare Industry
    It has been more than six years since the ChoicePoint data breach thrust the issue of privacy protection into the headlines. Since then hundreds of information securit...
  12. October 14, 2010
    Data Center Outages and Data Management
    I hear the collective sound of our friends, colleagues, and other interested parties scratching their heads at the release of the most recent piece of Ponemon Institute res...
  13. July 1, 2010
    Benchmarking Information Security Efficiency
    Recently the Ponemon Institute completed a new project, the Security Efficiency Benchmark Study, the purpose of which was to learn what IT security leaders in the UK and Eu...
  14. July 1, 2010
    Benchmarking Information Security Efficiency
    Recently the Ponemon Institute completed a new project, the Security Efficiency Benchmark Study, the purpose of which was to learn what IT security leaders in the UK and Eu...
  15. April 17, 2010
    Economic Impact of Privacy on Online Behavioral Advertising
    Independent Ponemon Institute research looks into the controversial behavioral advertising industry to understand from marketers their experience with the medium’s su...
  16. April 14, 2010
    2010 Security in the Trenches
    We just completed a survey of federal IT security professionals to examine the data protection posture of government agencies. Through the survey, sponsored by CA, we ...
  17. February 17, 2010
    How Global Organizations Approach the Challenge of Protecting Personal Data
    How data privacy perceptions and practices around the globe inform and influence data protection practices. More than 5,500 business leaders were surveyed....
  18. January 18, 2010
    2010 Access Governance Trends Survey
    This second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...
  19. December 10, 2009
    Training Is the Strongest Link
    Today we held a RIM College event featuring three noted experts in corporate privacy training programs -- namely, Dean Forbes (Merck), Bob Posch (Merck) and John Block (Med...
  20. December 5, 2009
    Sophos & Ponemon Institute Announces New Study
    We are pleased to present The State of Privacy and Data Security Compliance study conducted by Ponemon Institute and sponsored by Sophos. The purpose of the study is to det...
  21. November 21, 2009
    Crowe Horwath & Ponemon release HITECH study
    I am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 7...
  22. November 19, 2009
    eGov Initiative Not Without Risk to Citizen Data
    The eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...
  23. August 31, 2009
    The Goal is Credibility
    I want to share an article with you that I think has a tremendous lesson for anyone in the business of building trust.  The article is from a recent edition of Foreign...
  24. July 21, 2009
    Archer-Ponemon Treaty for Data Governance
    I’m still processing a lot of the information gathered, shared, and created during our 8th RIM Renaissance this past weekend in Minneapolis. One of our sessions ...
  25. July 14, 2009
    What We have here is, Failure to Communicate
    Privacy pro: Do you ever feel like you are working overtime to meet overly ambitious expectations? Are you frustrated by your attempts to outline a plan for protecting...
Scroll to Top

Categories


Tags


Archive

202220212020201920182017201620152014201320122011201020092008