close Security
  1. November 20, 2020
    The State of Breach and Attack Simulation and the Need for Continuous Security Validation: A Study of US and UK Organizations
    The purpose of the research, sponsored by Cymulate, is to better understand how the rapidly evolving threat landscape and the frequency of changes in the IT architecture an...
  2. November 6, 2020
    Rethinking Firewalls: Security and Agility for the Modern Enterprise
    Rethinking Firewalls: Security and Agility for the Modern Enterprise, sponsored by Guardicore, was conducted to learn how enterprises perceive their legacy firewalls within...
  3. July 31, 2019
    Exabeam SIEM Productivity Study
    The purpose of this study is to understand how Exabeam’s SIEM solution compares to other SIEM solutions in terms of saving time and increasing productivity, realizing val...
  4. January 22, 2015
    2014: A Year of Mega Breaches
    Ponemon Institute, with sponsorship from Identity Finder, conducted 2014: A Year of Mega Breaches to understand if and how organizations have changed their data protection ...
  5. October 29, 2014
    Security & Compliance Trends in Innovative Electronic Payments
    New electronic payment systems and virtual currencies are expected to make paper currency the horse and buggy of the 21st  century. Are organizations up to the challen...
  6. June 25, 2013
    The State of Risk Based Security Management
    Ponemon Institute and Tripwire continue to study the state of risk-based security management. This annual study is conducted to understand the level of maturity of RBSM. In...
  7. July 10, 2012
    Encryption in the Cloud Who is responsible for data protection in the cloud?
    Ponemon Institute is pleased to present the findings of Encryption in the Cloud. This research is a supplementary report that is part of a larger study entitled the 2011 Gl...