{"id":1985,"date":"2013-02-20T00:00:00","date_gmt":"2013-02-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/20\/ponemon-institute-research-reveals-cyber-attacks-on-trust-can-cost-every-global-enterprise-up-to-39\/"},"modified":"2021-12-30T11:40:25","modified_gmt":"2021-12-30T11:40:25","slug":"ponemon-institute-research-reveals-cyber-attacks-on-trust-can-cost-every-global-enterprise-up-to-39","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/20\/ponemon-institute-research-reveals-cyber-attacks-on-trust-can-cost-every-global-enterprise-up-to-39\/","title":{"rendered":"Ponemon Institute Research Reveals Cyber Attacks on Trust Can Cost Every Global Enterprise Up to $39"},"content":{"rendered":"<p>Ponemon Institute and Venafi, the inventor of and market leader in Enterprise Key and Certificate Management (EKCM) solutions, today announced the 2013 Annual Cost of Failed Trust Report: Threats &#038; Attacks.   This new annual report provides the first extensive examination of how failure to control trust in the face of new and evolving security threats places every global enterprise at risk. The most essential of these technologies are cryptographic keys and digital certificates, which provide the foundation of trust for the modern world of secure communications, card payments, online shopping, smartphones and cloud computing. Clear and present danger to cloud computing: Respondents believe difficult-to-detect attacks on Secure Shell (SSH) keys, critical for cloud services from Amazon and Microsoft, present the most alarming threat arising from failure to control trust.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;In partnering with Venafi, we set out to answer for the first time one of the most sought-after questions in information security and compliance: what are the precise financial consequences of failed trust from malicious attacks that exploit cryptographic key and certificate management failures?&#8221;<\/p>\n<p>&#8220;This new research not only allows us to quantify the cost of these trust exploits, but also gives insight into how enterprise failures in key and certificate management open the door to criminals.   More than half of the companies surveyed, for instance, do not know how many keys and certificates they have, which is both a serious security issue and a Governance, Risk and Compliance (GRC) gap that executives must address with proper controls,&#8221; said Ponemon.   &#8220;It&#8217;s not surprising then that all companies we spoke with had suffered an attack on trust due to failed key and certificate management, or that these attacks are projected to cost organizations an average of $35 million, with a maximum possible cost exposure of $398 million per organization. <\/p>\n<p>&#8220;Cyber criminals understand how fragile our ability to control trust has become, and as a result, they continue to target failed key and certificate management,&#8221; said Venafi CEO Jeff Hudson. <\/p>\n<p>As our world becomes more connected and more dependent on cloud and mobile technologies, maintaining control over trust by managing keys and certificates must be a top priority for all CEOs, CIOs, CISOs and IT security managers,&#8221; Hudson continued. <\/p>\n<p>Link: http:\/\/mw.newsblaze.com\/release\/2013022006001800010.mwir\/topstory.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1985","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1985"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1985\/revisions"}],"predecessor-version":[{"id":4472,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1985\/revisions\/4472"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}