Results
- November 4, 2011Best Practices in Data Protection Study ReleasedSponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this stud...Read More
- April 3, 2011Are we taking adequate steps to protect the critical infrastructure?Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research r...Read More
- March 8, 2011Cost of a data breach climbs higherMost privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat i...Read More
- March 7, 2011Listen to a new podcast on the True Cost of Compliance studyDear friends and colleagues, Please listen to a recent podcast on the True Cost of Compliance study completed last month. Martin KcMeay at Network Security Blog did a...Read More
- January 31, 2011Compliance Like a ClubHave you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information secur...Read More
- July 12, 2010Integrated, Holistic Security StrategiesHolistic is a popular word these days. Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the fun...Read More
- May 3, 2010Fear and Loathing in Online AdvertisingHave you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or ev...Read More
- January 18, 20102010 Access Governance Trends SurveyThis second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...Read More
- November 19, 2009eGov Initiative Not Without Risk to Citizen DataThe eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...Read More
- June 10, 2009More Employees Ignoring Data Security PoliciesDoes it surprise you to learn that, according to our recent study, Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, employee c...Read More