Ponemon Institute

  • Four tough questions about implementing orchestration for your federal agency – and how to answer them

    The cybersecurity environment has shifted dramatically in recent years, and that means yesterday’s tools and approaches – especially those which rely upon manual and/or siloed processes – will no longer suffice.

  • How we must move security earlier in the development process

    John Frizelle, the chief architect for mobile at Red Hat, details three steps to make mobile app development more secure.

  • IT managers moving to cloud despite skepticism

    Most IT managers are moving data to the cloud, but 40 percent of them believe doing that will weaken security of that data.

  • Online forum seeks cloud computing best practices

    SafeGov.org aims to provide government with a greater understanding of the benefits of cloud computing.

  • Vendors see a growing need for cyber insurance

    Companies are considering insurance as a way to reduce risk and protect themselves from data breaches or hacks. Dr. Larry Ponemon tells us more about it.

  • Comparing cloud use in the U.S. and Europe

    Who’s using cloud more — the U.S. or Europe? What are the biggest concerns when it comes to security on both sides of the Atlantic? Should you be developing a cloud strategy now, or should…

  • Identification Technology and Citizen Privacy

    June 15th The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver’s licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.

  • Is cyber war a reality . . . or impossible?

    Learn more in today’s cybersecurity update.

  • Tech trends present greatest threat to federal agencies

    Ponemon Institute study details why.