8 results in Reports
Sort by:
  • Chase Cunningham

Search Results

  • Report Using AI For Evil

    A Guide To How Cybercriminals Will Weaponize And Exploit AI To Attack Your Business

    The tools of artificial intelligence (AI), from text analytics to facial recognition to machine learning (ML) platforms, are transforming almost every aspect of business from personalized customer...

  • Report The Zero Trust eXtended (ZTX) Ecosystem

    Strategic Plan: The Security Architecture And Operations Playbook
    January 19, 2018 | Chase Cunningham

    Security pros are still scrambling for new and effective ways to protect their networks and combat the impacts of hacking and exploitation. With Forrester's Zero Trust Model of information...

  • Report Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. Zero Trust mandates the creation of microperimeters of control around an enterprise's...

  • Report The Zero Trust eXtended (ZTX) Ecosystem: People

    Develop Your Zero Trust Workforce Security Strategy
    December 5, 2017 | Chase Cunningham

    The concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve...

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    November 1, 2017 | Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros devote resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way...

  • Report Artificial Intelligence Will Revolutionize Cybersecurity

    But Security Leaders Must View All Vendor Claims With Skepticism

    Security vendors are inundating CISOs with products purporting to use artificial intelligence to dramatically improve the accuracy and speed of both threat detection and response. However, much of...

  • Report Protect Your Digital Workforce With Browser Isolation Technology (BIT)

    BIT Helps S&R Pros Implement Zero Trust For Workforce Security
    July 21, 2017 | Chase Cunningham

    Employees today must use a browser to access most of their corporate applications, email, and collaboration tools. A variety of common threat vectors target basic user interactions as employees use...

  • Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...