Featured content
The Data Security And Privacy Playbook For 2021
Protect Your Intellectual Property And Customer Data From Theft And Abuse
Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, while privacy...
Charts & Figures
-
-
Internal Incidents Are A Common Cause Of Breaches
December 7, 2016
-
Search Results
-
Report The State Of Data Security And Privacy: 2018 To 2019
This data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in global firms for 2018 through 2019. Understanding...
-
Report Understand The State Of Data Security And Privacy: 2016 To 2017
December 7, 2016 | Heidi SheyThroughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...
-
Report Understand The State Of Data Security And Privacy: 2015 To 2016
January 8, 2016 | Heidi SheyThroughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...
-
Report Predictions 2016: The Trust Imperative For Security & Risk Pros
International Regulation Will Drive Change In The 2016 Privacy Landscape
In 2016, short-sighted firms will make the mistake of thinking that privacy is only about meeting compliance and regulatory requirements at the lowest possible cost, while enlightened ones will...
-
Report Quick Take: European Court Of Justice Declares Safe Harbor Invalid
Don't Panic; You Can Help Your US Digital Business Continue Handling EU Customer Data
Since 2000, firms operating across the Atlantic have used the US-EU Safe Harbor agreement as a means to lawfully transfer data concerning EU citizens to the US. However, on October 6, the European...
-
Report The Cybercriminal's Prize: Your Customer Data And Intellectual Property
September 2, 2015 | Heidi SheyProtecting customer data such as credit card information, log-in credentials, and other personally identifiable information (PII) is one of the top priorities for both security and risk (S&R)...
-
Report Understand The State Of Data Security And Privacy: 2014 To 2015
December 1, 2014 | Heidi Shey, Kelley MakThroughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Business...
-
Report Lessons Learned From Global Customer Data Breaches And Privacy Incidents Of 2013-14
Frustrated security and risk (S&R) professionals once wished for more media coverage of customer data breaches and privacy abuses to help them raise the importance of security with naive business...
-
Report Job Description: Chief Privacy Officer
October 9, 2014 | Heidi SheyCustomers around the globe have become highly sensitive to how organizations track, use, and store their personal data. As a result, a plethora of often-conflicting privacy laws has emerged in...
-
Report Brief: EU Safe Harbor Review Impacts US Privacy Processes
European Privacy Regulators Play Hardball With US Safe Harbor Rules And Demand Changes
October 6, 2014 | Heidi Shey, Andrew RoseThe EU Data Protection Act (DPA) attempts to ensure consistent protection of EU data by prohibiting the transfer of personal information to non-EU countries unless they meet the "adequacy" standard...
-
Report Unmasking Consumer Privacy Tools
Uses, Benefits, And Implications For S&R Pros
September 5, 2014 | Heidi SheyConsumerization is alive and well, and today's engaged tech-savvy employees will bring in tools and services of their choosing to help them do their jobs better and more efficiently. This includes...
-
Report Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk
It's Time For Healthcare CISOs To Close The Faucet Of Data Loss From Endpoints
Amid a rising tide of compliance pressures, employee mobility, and high black-market values for personally identifiable information (PII) and personal healthcare information (PHI), security and...
-
Report TechRadar™: Data Security, Q2 2014
Tools To Define, Dissect, And Defend Your Data
We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...
-
Report Understand The State Of Data Security And Privacy: 2013 To 2014
October 1, 2013 | Heidi SheyThroughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Forrsights...
-
Report Dissect Data To Gain Actionable INTEL
Forrester's Data Security And Control Framework
August 9, 2012 | Heidi Shey, John KindervagForrester segments the problem of securing and controlling data into three areas: 1) defining the data; 2) dissecting and analyzing the data; and 3) defending and protecting the data. We refer to...
Content Type
ApplyFilters
Industry
- Financial Services (3)
- Healthcare (2)
- Retail (1)
Methodology
- Business Technographics (40)
- TechRadar (1)