Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
-
Four Steps To Create A Strategic Program To Manage The Human Risks
January 13, 2021
-
Search Results
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report Job Description: Director Of Threat Intelligence
The Infosec Renaissance Pro
July 13, 2020 | Brian KimeSecurity and risk (S&R) professionals frequently struggle to maximize the value of their investments in threat intelligence solutions. Improperly treating threat intelligence as a technical control...
-
Report Enhance EX With Zero Trust
Business Case: The Zero Trust Security Playbook
Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and...
-
Report Sell Your Zero Trust Strategy Internally
Gain Advocacy, Support, And Budget For Your Security Vision
June 23, 2020 | Jinan Budge, Chase CunninghamSecurity and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...
-
Report Bust The Zero Trust Myths
Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
June 22, 2020 | Jinan Budge, Chase CunninghamZero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...
-
Report Microservice Application Platforms Need A New Type Of Reference Architecture
The Unique Needs Of Each Business Domain Call For Custom Cloud-Native Application Platforms
March 6, 2020 | Randy HeffnerIn these early days for microservices, it's clear that they face a long road to maturity: Only 13% of microservices users say they have production-proven platforms. Enterprises need microservice...
-
Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020
The 12 Providers That Matter Most And How They Stack Up
In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...
-
Report Build A Security Champions Network
How To Integrate Security Culture Across Your Organization
Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...
-
Report Plan Your Microservice Application Platforms Using A New Structure For A New Era
Java Is A Useful Point Of Contrast For Future Cloud-Native Application Platforms
February 11, 2020 | Randy HeffnerWhile enterprise developers increasingly adopt microservices, maturity will be a long time in coming. For mainstream developers to build high-end solutions with microservices, enterprises need...
-
Report A CISO's Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
January 9, 2020 | Jinan BudgeCybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...
-
Report Research Overview: Security Awareness, Behavior, And Culture
A CISO's Guide To Research About The People Side Of Security
October 30, 2019 | Jinan BudgeThe people element of security has long sat on the back burner as security and risk (S&R) pros buy product after product without first solving fundamental problems. People and culture are central...
-
Report With Microservices, A Service Mesh Helps Developers Focus On The Business
Diverse Hybrid Microservice Patterns Will Drive Service Mesh Specialization
October 24, 2019 | Randy HeffnerMicroservices provide application modularity and deployment flexibility, building agility for innovation and rapid response to digital disruption. But distributed systems are hard, and...
-
Report Four Technologies Combine To Protect You From Ransomware Attacks
October 18, 2019 | Naveen ChhabraAs the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware. Ransomware attacks do not...
-
Report Master Your Security Service Catalog
Processes: The S&R Practice Playbook
October 10, 2019 | Paul McKayCISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. But too many CISOs focus only on delivering technical controls, which results in a...
-
Report Security Budgets In Asia Pacific, 2019
Budgets Are Rising As The Region Continues To Play Catch-Up
July 15, 2019 | Jinan BudgeIn 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...
-
Report Executive Spotlight: Top Priorities For Security And Risk Leaders In 2019
The Top Five Priorities That Security And Risk Leaders Are Focusing On
June 7, 2019 | Jinan BudgeForrester's Security & Risk Council is comprised of some of the senior-most security and risk (S&R) executives at companies with $1 billion or more in revenue. Each year, we ask our members about...
-
Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019
Forrester's Landscape Overview Of 21 Providers
A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...
-
Report Design For Dependability By Embracing A Future Of Trusted Technology
Reliable Services Are Critical For A Secure, Always-On Economy
February 25, 2019 | Naveen ChhabraAs the world evolves into a connected web of services that weave devices, users, and data in a seamless user experience, the megacloud providers have set expectations — for always-on capabilities,...
-
Report Now Tech: Managed Security Services In Asia Pacific, Q1 2019
Forrester's Overview Of 19 Managed Security Service Providers
January 16, 2019 | Jinan BudgeYou can use managed security services to rapidly transform your security operations, improve your talent diversity, increase your breadth of skills, and support your global business. But to access...
Content Type
ApplyFilters
Industry
- Manufacturing (1)
Primary Role
Topics
Methodology
- Business Technographics (9)
- Forrester Wave (4)
- New Tech (1)
- Now Tech (1)
Region
- Asia Pacific (6)
Vendor
- Proofpoint (4)
- Accenture (1)
- AT&T (1)
- Capgemini (1)
- Deloitte (1)
- EY (1)
- Fujitsu (1)
- IBM (1)
- Infosys (1)
- Symantec (1)
- Tata Consultancy Services (TCS) (1)
- Tech Mahindra (1)
- Verizon Communications (1)
- Wipro (1)
Analyst
- Jinan Budge (22)
- Brian Kime (6)
- Naveen Chhabra (4)
- Claire O'Malley (2)
- Paul McKay (2)
- Andrew Hewitt (1)
- David Holmes (1)
- Joseph Blankenship (1)
- Merritt Maxim (1)