- March 27, 2022Architecting the Next Generation of OT CybersecurityPonemon Institute is pleased to announce the release of Architecting the Next Generation of OT Cybersecurity, sponsored by AppliedRisk....Read More
- November 8, 2021The Importance of Securing Embedded and Connected Devices in the Supply ChainSponsored by Finite State, Ponemon Institute surveyed 632 IT and IT security practitioners in the U.S. who are familiar with their organizations’ approach to securing emb...Read More
- April 7, 2021The State of Machine Identity ManagementSponsored by Keyfactor, Ponemon Institute surveyed 1,162 IT security professionals in the US and EMEA to learn important information about how organizations are managing cr...Read More
- April 5, 2021Reducing Enterprise Application Security Risks: More Work Needs to Be DoneReducing Enterprise Application Security Risks: More Work Needs to Be Done examines the reasons why the highest level of security risk is considered by many to be in the ap...Read More
- April 5, 2021The State of Threat Feed Effectiveness in the United States and the United KingdomPonemon Institute is pleased to announce the release of The State of Threat Feed Effectiveness in the United States and the United Kingdom, sponsored by Neustar ...Read More
- March 5, 2021The Role of Transparency and Security Assurance in Driving Technology Decision-makingRead More
- November 20, 2020The State of Breach and Attack Simulation and the Need for Continuous Security Validation: A Study of US and UK OrganizationsThe purpose of the research, sponsored by Cymulate, is to better understand how the rapidly evolving threat landscape and the frequency of changes in the IT architecture an...Read More
- November 6, 2020Rethinking Firewalls: Security and Agility for the Modern EnterpriseRethinking Firewalls: Security and Agility for the Modern Enterprise, sponsored by Guardicore, was conducted to learn how enterprises perceive their legacy firewalls within...Read More
- October 29, 20202020 Global PKI and IoT Trends StudyAccording to the findings, digital certificate use is growing rapidly for cloud applications and user authentication. Additionally, the rapid growth in the use of IoT devic...Read More
- June 1, 2020The State of SOC Effectiveness: Signs of Progress but More Work Needs to Be DoneRead More
- May 31, 2020The Economic Value of Prevention in the Cybersecurity LifecyclePonemon Institute is pleased to present the findings of The Economic Value of Prevention in the Cybersecurity Lifecycle, sponsored by Deep Instinct. ...Read More
- July 31, 2019Exabeam SIEM Productivity StudyThe purpose of this study is to understand how Exabeam’s SIEM solution compares to other SIEM solutions in terms of saving time and increasing productivity, realizing val...Read More
- November 17, 2018Data Risk in the Third-Party Ecosystem: Third Annual StudyWe are pleased to present the findings of Data Risk in the Third-Party Ecosystem: Third Annual Study, sponsored by Opus, to understand the challenges companies face in prot...Read More
- July 10, 2018Separating the Truths from the Myths in CybersecurityPonemon Institute is pleased to anounce the release of Separating the Truths from the Myths in Cybersecurity, sponsored by BMC. The purpose of this study is to better under...Read More
- April 26, 2018Data Breaches Caused by Insiders Increase in Frequency and CostPonemon Institute and ObserveIT have released The 2018 Cost of Insider Threats: Global Study, on what companies have spent to deal with a data breach caused by a careless o...Read More
- March 15, 2018Ponemon Institute Announces the Release of the 2018 Megatrends StudyA major deterrent to achieving a strong security posture is the inability for IT professionals to know the big changes or megatrends in security threats that they need to b...Read More
- November 28, 2017Will Security & Privacy Concerns Stall the Adoption of Autonomous Automobiles?Ponemon Institute is pleased to announce the release of Will Security & Privacy Concerns Stall the Adoption of Autonomous Automobiles?, presented at The Securing M...Read More
- November 2, 2017The Evolving Role of CISOs and Their Importance to the BusinessWe are pleased to announce the release of The Evolving Role of CISOs and Their Importance to the Business. The realization is growing in the C-Suite that just one serious s...Read More
- October 1, 20172017 Cost of Cyber Crime StudyPonemon Institute is pleased to announce the release of the 2017 Cost of Cyber Crime report. Ponemon Institute conducted the first Cost of Cyber Crime study in the United S...Read More
- July 17, 2017The Internet of Things (IoT): A New Era of Third-Party RiskThe Internet of Things: A New Era of Third-Party Risk was sponsored by Shared Assessments and conducted by Ponemon Institute to understand organizations’ level of awa...Read More
- June 15, 20172017 Study on Mobile and Internet of Things Application SecurityPonemon Institute is pleased to present the findings of the 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan Technologies. The pu...Read More
- June 13, 20172017 Cost of Data Breach Study: United StatesIBM Security and Ponemon Institute are pleased to present the 2017 Cost of Data Breach Study: United States, our 12th annual benchmark study on the cost of data breach inci...Read More
- February 6, 20172016 Cost of Cyber Crime Study & the Risk of Business InnovationWe are pleased to present the 2016 Cost of Cyber Crime Study & the Risk of Business Innovation sponsored by Hewlett Packard Enterprise. This year’s study on the a...Read More
- January 17, 2017The Rise of RansomwareWe are pleased to present the findings of The Rise of Ransomware, sponsored by Carbonite, a report on how organizations are preparing for and dealing with ransomware infect...Read More
- July 1, 2016SMBs are vulnerable to cyber attacksWe are pleased to announce the release of a study focused on the cybersecurity threat to small and medium-sized companies (SMBs). Based on the findings, we conclude that no...Read More
Security
Categories
Tags
- Access Governance (2)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (1)
- Application Security (3)
- Authentication Process (1)
- Autonomous Automobile (1)
- Autonomous Car (1)
- Autonomous Vehicle Security (1)
- Best Practices (10)
- Big Data (1)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- BYOID (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (2)
- Communication Inefficiency (1)
- Compliance (7)
- Confidential Data (2)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (2)
- Cryptographic (1)
- Cryptographic Key (1)
- Cryptography (3)
- Cyber Attack (2)
- Cyber Attacks (17)
- Cyber Crime (9)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (2)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (2)
- Cyber Threat (2)
- Data Breach (29)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (3)
- Data Loss (1)
- Data Protection (12)
- Data Risk (1)
- Data Security (14)
- DDoS (2)
- Denial Of Service (1)
- Digital Certificate Management (2)
- DLP (2)
- Document-centric Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encrypting Ransomware (1)
- Encryption (5)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (5)
- Explanation Of Benefits (1)
- File Sharing (1)
- Firewall (1)
- Fraud (3)
- Geo-location (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Hidden Threats (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Incident Response (1)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (1)
- Intellectual Property (1)
- Internet Of Things (2)
- IT Architecture (1)
- IT Security (12)
- IT Security Department (2)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (9)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (1)
- Online Banking (1)
- Online Behavioral Advertising (1)
- Online Health Services (1)
- Open Enterprise (1)
- Operational Technology (OT) (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- PKI (2)
- Post Breach (1)
- Privacy (8)
- Privacy Compliance (1)
- Product security (1)
- Productivity (1)
- Providers (1)
- Ransomware (2)
- Regulated Data (1)
- Retail Banking (2)
- Retail Breaches (1)
- Risk (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk Management (2)
- SaaS (1)
- Security (7)
- Security Innovation (1)
- Security Intelligence (4)
- Security Metrics (1)
- Security operations center (1)
- Security Posture (2)
- Security Professional (1)
- Security Risk (5)
- Security Strategy (1)
- Security Technologies (6)
- Security Threat (2)
- Senior Executives (2)
- SIEM (2)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SQL Injection (2)
- SSO (1)
- Staff (1)
- Supply chain security (1)
- System Glitch (1)
- Technology (1)
- Third Party Risk (4)
- Third-party Ecosystem (2)
- Threat Intelligence (7)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Understaffed (1)
- Vulnerable Code (1)
- Web-based Attacks (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202220212020201920182017201620152014- January (3)
- February (4)
- March (4)
- April (4)
- May (2)
- June (4)
- July (3)
- August (1)
- September (2)
- October (3)
- November (1)