Social Media

Also referred to as Web 2.0, this term describes the convergence between human interaction and Internet-based groundswell technologies such as mobile and video (e.g., Facebook, Twitter, and YouTube, etc.). Research coverage includes user-generated content and rich Internet applications.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

43 results in Reports

  • John Kindervag
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires iSight Partners

    Deal Bolsters FireEye But Comes With Certain Customer Caveats

    FireEye announced on January 20 the acquisition of threat intelligence vendor iSight Partners for $200 million, giving the antimalware vendor an entry into the crowded threat intelligence market....

    • Downloads: 76
  • For Security & Risk Professionals

    Report:Quick Take: Apple Does The Right Thing To Defend Customer Privacy

    CEO Tim Cook Backs Customers With Fight Over San Bernardino Shooter's Data

    The legal battle continues between those who advocate for employees' and citizens' right to privacy versus those who advocate for stronger law enforcement and government surveillance capabilities....

    • Downloads: 95
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 1027
  • For Application Development & Delivery Professionals

    Report:Big Data Security Strategies For Hadoop Enterprise Data Lakes

    Apply Zero Trust To Your Big Data Security Strategy

    The crown jewels must be protected. Data stored in Hadoop is no exception. As application development and delivery (AD&D) professionals rush to build data lakes using Hadoop, they often do so without...

    • Downloads: 81
  • For Security & Risk Professionals

    Report:Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook

    At Forrester, we believe the threat landscape is mutating, not evolving. Highly skilled, well-funded, organized cybercriminals will steal your data — the lifeblood of today's digital business...

    • Downloads: 1228
  • For Security & Risk Professionals

    Report:Seven Steps To Protect Your eCommerce Website In 2016

    Start Now To Protect Your Site Before The Next Holiday Crunch

    During the busy holidays, there is always news of a website breach or crash. Despite the millions of dollars they generate for their businesses, websites remain vulnerable to cyberattack, performance...

    • Downloads: 122
  • For Security & Risk Professionals

    Report:Case Study: WestJet Redefines Its Security With Forrester's Zero Trust Model

    WestJet Enables An Agile Architecture And Fortified Security With Zero Trust

    Legacy perimeter-centric approaches to security are ineffectual for today's digital business. Security and risk (S&R) leaders need a new approach, and that approach is Forrester's Zero Trust Model of...

    • Downloads: 207
  • For Security & Risk Professionals

    Report:Five Steps To A Zero Trust Network

    Strategic Plan: The Security Architecture And Operations Playbook

    A Zero Trust network abolishes the quaint idea of a "trusted" internal network demarcated by a corporate perimeter. Instead, it recognizes that today's digital businesses must win, serve, and retain...

    • Downloads: 397
  • For Security & Risk Professionals

    Report:TechRadar™: Data Security, Q1 2016

    Road Map: The Data Security And Privacy Playbook

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

    • Downloads: 368
  • For Security & Risk Professionals

    Report:Rethinking Data Loss Prevention With Forrester's DLP Maturity Grid

    Data loss prevention (DLP) remains a key technology to help prevent the leakage and exfiltration of the firm's most sensitive data. Using client feedback, survey data, and input from security leaders...

    • Downloads: 2039
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

    • Downloads: 154
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: 2014

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

    • Downloads: 754
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1094
  • For Security & Risk Professionals

    Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Governments, Criminals, Tech Giants, Customers, And Enterprises Spar Over Protections And Rights

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

    • Downloads: 627
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1582
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires Mandiant

    FireEye Emerging As A Leader In A New Breed Of Security Companies

    On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

    • Downloads: 242
  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 418
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 682
  • For Security & Risk Professionals

    Report:Rethinking Data Discovery And Data Classification Strategies

    Strategic Plan: The Data Security And Privacy Playbook

    Defining data via data discovery and classification is an often overlooked, but critical, component of data security and privacy. Security and risk (S&R) pros can't expect to adequately protect data...

    • Downloads: 1090
  • For Security & Risk Professionals

    Report:Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses, but for economic and even political gain, highly skilled cybercriminals and malicious insiders are determined to steal it. Meanwhile, customers...

    • Downloads: 1288
  • For Security & Risk Professionals

    Report:Quick Take: 12 Lessons For Security & Risk Pros From The US OPM Breach

    On June 4, the United States Office of Personnel Management (OPM) disclosed a cybersecurity incident affecting at least 4 million individuals, whose personally identifiable information (PII) may have...

    • Downloads: 329
  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires ThreatGrid, Bolstering Advanced Malware Protection

    Cisco Broadens A Strong Portfolio But Still Needs To Better Explain Its Overall Security Product Road Map

    On May 20, 2014, Cisco Systems announced its intention to acquire privately-held dynamic malware analysis company ThreatGrid for an undisclosed amount. This acquisition enhances Cisco Systems'...

    • Downloads: 116
  • For Security & Risk Professionals

    Report:Rules Of Engagement: A Call To Action To Automate Breach Response

    It seems that not a day goes by that there isn't another massive security breach in the news. Consumers around the globe hear about continual threats to their personal data while name brand retailers...

    • Downloads: 276
  • For Security & Risk Professionals

    Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

    But Only If Cisco Doesn't Strangle Innovation

    On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

    • Downloads: 245
  • For Security & Risk Professionals

    Report:Welcome To The New Era Of Encryption

    S&R Pros Must Use Encryption As The Technological Keystone Of Privacy

    Talking about encryption is all the rage these days — from revelations about the National Security Agency's (NSA's) surveillance program to a new wave of movies and TV shows featuring hackers...

    • Downloads: 311