Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Ponemon Institute

Below you will find reports with the source of “Ponemon Institute”

image from The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

A survey of over 1,000 US and UK IT professionals on the challenges to having the necessary in-house expertise to achieve a strong cybersecurity posture. (more available)
Added: September 3, 2020
image from The state of vulnerability management in the cloud and on-premises

The state of vulnerability management in the cloud and on-premises

A survey-baed report of 1,848 IT and IT Security professionals on the challenges with vulnerability prioritization and the importance of patch management for the prevention of breaches. (more available)
Added: August 18, 2020
image from Cost of a Data Breach Report 2020

Cost of a Data Breach Report 2020

The 2020 update of this survey-based review of the costs of a data breach, as reported by practitioners in the field. (more available)
Added: July 30, 2020
image from Cyber Resilient Organization Report 2020

Cyber Resilient Organization Report 2020

The fifth annual survey uses survey results from over 3,4000 It and security professionals on organization’s ability to detect, prevent, contain, and respond to cybersecurity incidents. (more available)
Added: July 1, 2020
image from 2020 Cost of Insider Threats: Global Report

2020 Cost of Insider Threats: Global Report

Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats: Global study. Sponsored by ObserveIT and IBM, this is the third benchmark study conducted to understand the direct and indirect costs that result from insider threats. (more available)
Added: March 29, 2020
image from The Economics of Security Operations Centers: What is the True Cost for Effective Results?

The Economics of Security Operations Centers: What is the True Cost for Effective Results?

Ponemon Institute is pleased to present the findings on the economics of today’s Security Operations Centers (SOC). Sponsored by Respond Software, Ponemon Institute surveyed 637 IT and IT security practitioners in organizations that have a SOC and are knowledgeable about cybersecurity practices in their organizations. (more available)
Added: March 29, 2020
image from Costs and Consequences of Gaps in Vulnerability Response

Costs and Consequences of Gaps in Vulnerability Response

Ponemon Institute is pleased to present the findings of the second study on vulnerabilityand patch management. As shown inthis research, the severity and volume ofcyberattacks is increasing. (more available)
Added: February 17, 2020
image from Managing the Risk of Post-breach or "Resident" Attacks

Managing the Risk of Post-breach or "Resident" Attacks

Ponemon Institute surveyed 627 IT and IT security practitioners in the United States to understand how well organizations are addressing cyber risks associated with attackers who may already be residing within the perimeter, including insiders that might act maliciously. (more available)
Added: September 18, 2019
image from The Cost Of Third-Party Cybersecurity Risk Management

The Cost Of Third-Party Cybersecurity Risk Management

CyberGRX and Ponemon Institute surveyed over 600 IT security professionals to learn more about the cost and efficacy of the tools and processes used to conduct third-party cyber risk management today. (more available)
Added: April 19, 2019
image from The Cost Of Cybercrime

The Cost Of Cybercrime

The ninth annual cost of cybercrime study helps to quantify the economic cost of cyberattacks by analyzing trends in malicious activities over time. (more available)
Added: April 4, 2019
image from The Internet of Things (IoT): A New Era of Third-Party Risk

The Internet of Things (IoT): A New Era of Third-Party Risk

The Internet of Things: A New Era of Third Party Risk was sponsored by Shared Assessments and conducted by Ponemon Institute to understand organizations’ level of awareness and preparedness for the upcoming enterprise IoT wave. (more available)
Added: March 7, 2019
image from The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

Ponemon Institute is pleased to present The Value of Threat Intelligence: Annual Study of North American and United Kingdom Companies, sponsored by Anomali. (more available)
Added: March 1, 2019
image from Challenging State Of Vulnerability Management Today

Challenging State Of Vulnerability Management Today

In the last two years, businesses and governments have seen data breaches like Equifax and Marriott impact 100s of millions of accounts each, as well as critical intellectual property (IP) and core operations. (more available)
Added: February 17, 2019
image from Securing The Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices

Securing The Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices

Synopsys and SAE International partnered to commission this independent survey of the current cybersecurity practices in the automotive industry to fill a gap that has existed far too long—the lack of data needed to understand the automotive industry’s cybersecurity posture and its capability to address software security risks inherent in connected, software-enabled vehicles. (more available)
Added: February 8, 2019
image from The 2019 State of Password and Authentication Security Behaviors Report

The 2019 State of Password and Authentication Security Behaviors Report

The purpose of this study is to understand the beliefs and behaviors surrounding password management and authentication practices for individuals both in the workplace and at home. (more available)
Added: January 31, 2019
image from Asssessing the DNS Security Risk

Asssessing the DNS Security Risk

Ponemon Institute is pleased to present the findings of Assessing the DNS Security Risk, sponsored by Infoblox. The purpose of this study is to understand the ability of organizations to assess and mitigate DNS risks. (more available)
Added: January 15, 2019
image from Measuring & Managing the Cyber Risks to Business Operations

Measuring & Managing the Cyber Risks to Business Operations

Measuring & Managing the Cyber Risks to Business Operations, which was sponsored by Tenable and conducted by Ponemon Institute, reveals global trends in how organizations are assessing and addressing cybersecurity risks. (more available)
Added: December 14, 2018
image from The Challenge Of Building The Right Security Automation Architecture

The Challenge Of Building The Right Security Automation Architecture

Security automation architecture can improve organizations’ security posture by augmenting or replacing human intervention in the identification and containment of cyber exploits or breaches through the use of such technologies as artificial intelligence, machine learning, analytics and orchestration. (more available)
Added: December 14, 2018
image from 2018 State of Cybersecurity in Small & Medium Size Businesses

2018 State of Cybersecurity in Small & Medium Size Businesses

Ponemon Institute is pleased to present the results of The 2018 State of Cybersecurity in Small and Medium Size Businesses sponsored by Keeper Security. (more available)
Added: November 23, 2018
image from How Much Is the Data on Your Mobile Device Worth?

How Much Is the Data on Your Mobile Device Worth?

The purpose of this research, sponsored by Lookout, is to understand the value of the data we access and store on our mobile devices and if we are doing enough to protect that data. (more available)
Added: October 26, 2018
image from The 2018 Global Cloud Data Security Study

The 2018 Global Cloud Data Security Study

This year’s study reveals the increasing risk of noncompliance with new global privacy and data protection regulations. Another important trend over the past three years is IT security’s continuing loss of control over cloud security practices and budget. (more available)
Added: October 26, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2021
Library updated: March 5, 2021 16:09 UTC (build 7e736b2)