Ponemon Institute

Higher encryption adoption driven by rising data breach threats
Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …
Query.AI raises $4.6M to scale its go-to-market and engineering teams to meet demand for its platform
Query.AI launched with $4.6 million in seed funding from ClearSky Security, DNX Ventures, and South Dakota Equity Partners. The company will use the funding to scale its …
Exabeam reimagines analytics to address security needs at scale
Exabeam announced Exabeam Fusion XDR and Exabeam Fusion SIEM, two new powerful cloud-delivered security products that efficiently solve threat detection, investigation and …
CyberGRX extends Framework Mapper capability to third parties
CyberGRX announced that its Framework Mapper capability is now available to third parties. With the ability to map CyberGRX’s assessment back to industry frameworks, third …

Consumer data protection is a high priority, but there’s still work to be done
Enterprises see protecting customer personal information as the top reason to encrypt data, and yet report actually encrypting customer data at a far lower rate. This and …

Challenges and benefits of using threat data feeds
Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many …

SOC analysts overloaded, but role more important than ever
Organizations are spending more to account for widespread security operation center (SOC) challenges including growing security management complexity, increasing analyst …

2020 brings unique levels of PKI usage challenges
Organizations are rapidly increasing the size, scope and scale of their data protection infrastructure, reflected in dramatic rises in adoption of public key infrastructure …

Most AppSec pros see a growing divide between them and developers
75% of AppSec practitioners and 49% of developers believe there is a cultural divide between their respective teams, according to ZeroNorth. As digital transformation takes …

The average total cost of a data breach declined, but costs increased for many organizations
Data breaches cost companies $3.86 million per breach on average, and compromised employee accounts are the most expensive root cause. Based on in-depth analysis of data …

Most consumers believe government regulation should help address privacy risks
As consumers’ concerns about their digital privacy continue to grow and who is responsible for guarding it remains unclear, new research conducted by Ponemon Institute …

Adopting more tools doesn’t necessarily improve security response efforts
While organizations have slowly improved in their ability to plan for, detect and respond to cyberattacks over the past five years, their ability to contain an attack has …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility