Results
- March 5, 2021The Role of Transparency and Security Assurance in Driving Technology Decision-makingRead More
- November 20, 2020The State of Breach and Attack Simulation and the Need for Continuous Security Validation: A Study of US and UK OrganizationsThe purpose of the research, sponsored by Cymulate, is to better understand how the rapidly evolving threat landscape and the frequency of changes in the IT architecture an...Read More
- November 6, 2020Rethinking Firewalls: Security and Agility for the Modern EnterpriseRethinking Firewalls: Security and Agility for the Modern Enterprise, sponsored by Guardicore, was conducted to learn how enterprises perceive their legacy firewalls within...Read More
- July 31, 2019Exabeam SIEM Productivity StudyThe purpose of this study is to understand how Exabeam’s SIEM solution compares to other SIEM solutions in terms of saving time and increasing productivity, realizing val...Read More
- February 26, 2013The Post Breach BoomData breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some ...Read More
- February 27, 2012Future State of IT Security A Survey of IT Security ExecutivesWe are pleased to present the findings of the Future State of IT Security conducted by Ponemon Institute in partnership with RSA® Conference. In this re...Read More