Advanced Search
168 results in Reports
Sort by:
Refine
  • Vulnerability & Threat Management

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2017

    Landscape: The Security Architecture And Operations Playbook
    January 26, 2017 | Josh Zelonis

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...

  • For Security & Risk Professionals

    Report

    Report The State Of Network Security: 2016 To 2017

    Benchmarks: The Security Architecture And Operations Playbook
    January 26, 2017 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2016 to...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Infrastructure & Operations Professionals

    Report

    Report Five Steps To Reinforce And Harden Application Security

    I&O Teams Must Prevent And Remediate App Vulnerabilities
    January 13, 2017 | Milan Hanson, Amy DeMartine

    Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Data Breaches And Privacy Abuses, 2016

    Continuous Improvement: The Data Security And Privacy Playbook
    January 9, 2017 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Data Security And Privacy: 2016 To 2017

    Benchmarks: The Data Security And Privacy Playbook
    December 7, 2016 | Heidi Shey

    Throughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...

  • For B2B Marketing Professionals

    Report

    Report Global Business Technographics® Security Survey, 2016: Overview

    A Business Technographics Presentation
    December 6, 2016 | Tyler McDaniel, Brian Luu

    This report is our overview of security decision-makers’ adoption of network security and security operations technologies; adoption of sourcing solutions to protect public cloud deployments;...

  • For Security & Risk Professionals

    Report

    Report Calculate The Business Impact And Cost Of A Breach

    Business Case: The Data Security And Privacy Playbook
    November 17, 2016 | Heidi Shey

    The business impact and cost of a breach are notoriously difficult to measure. A data breach initiates a tangle of direct and indirect costs, with some costs accruing in the immediate aftermath and...

  • For Security & Risk Professionals

    Report

    Report Maximize The Benefits Of Your Incident Response Retainer

    A Strong Relationship With Your Retainer Is Critical To Breach Response
    November 11, 2016 | Josh Zelonis

    To deal with the inevitability of a significant cyberattack and breach, security and risk pros are forging relationships with external breach notification and incident response (IR) firms. However,...

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    November 4, 2016 | Stephanie Balaouras, John Kindervag

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report Ransomware Protection Best Practices

    Harden Your Defenses Now For This Growing Threat
    November 4, 2016 | Chris Sherman, John Kindervag

    Ransomware, once just a consumer scourge, is increasingly holding enterprises hostage. However, by focusing on the basics and implementing proper controls, security and risk (S&R) pros can slow the...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Poor Planning, Not An IoT Botnet, Disrupted The Internet

    Dyn Outage Underscores The Need To Plan For Failure
    October 24, 2016 | Jeff Pollard, Joseph Blankenship

    On October 21, internet users went through a real exercise in one way the internet could die. Critical infrastructure exists on the internet as well as in the real world, and this attack crippled...

  • For Security & Risk Professionals

    Report

    Report The IoT Attack Surface Transcends The Digital-Physical Divide

    Security Leaders Must Prepare For High-Impact Attacks
    October 13, 2016 | Jeff Pollard, Merritt Maxim

    The internet of things (IoT) has evolved beyond a hyped buzzword into commercially available technologies that can significantly improve customer outcomes and deliver business benefits. However,...

  • For Security & Risk Professionals

    Report

    Report Your Security Products Aren't Secure

    What To Do When Trusted Technology Becomes The Target
    October 4, 2016 | Amy DeMartine, Jeff Pollard

    The nightmare scenario becomes reality as trusted security brands and technologies fail when facing attacks that target them directly. It's time to replace your bias toward trusting security...

  • For Security & Risk Professionals

    Report

    Report Brief: How To Meet November's Deadline And Build A Valuable Insider Threat Program

    Don't Just Check The NISPOM Change 2 Compliance Box
    September 26, 2016 | Joseph Blankenship, Claire O'Malley

    US Executive Order 13587 set the requirements for US government agencies to create an insider threat program to protect classified information. The US Department of Defense published Change 2 to...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Lessons For Security And Risk Pros From The Yahoo Breach

    Don't Prioritize Corporate Damage Control Over Customers' Interests
    September 23, 2016 | Stephanie Balaouras, Jeff Pollard

    On Thursday, Yahoo announced that cybercriminals had compromised the personal information including names, email addresses, dates of birth, phone numbers, and, in some instances, security questions...

  • For Security & Risk Professionals

    Report

    Report Planning For Failure: How To Survive A Breach

    An Effective Incident Management Program Is Essential To Help You Stay In Business
    September 9, 2016 | John Kindervag, Josh Zelonis

    Cybercriminals are using more sophisticated and targeted attacks to steal everything from valuable intellectual property to the sensitive personal information of your customers, partners, and...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Legal Privacy And Cybersecurity Services

    Nine Law Firms Marry Legal Expertise And Business Acumen To Solve Privacy And Cybersecurity Challenges
    August 12, 2016 | Enza Iannopollo

    In the past, security and risk (S&R) and privacy professionals might have left engaging with external law firms to their own legal departments. However, changes to the regulatory and business...

  • For Security & Risk Professionals

    Report

    Report Rules Of Engagement: A Call To Action To Automate Breach Response

    August 3, 2016 | Joseph Blankenship, John Kindervag

    As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data...

  • For Security & Risk Professionals

    Report

    Report Hunting Insider Threats

    Forrester's Model For Establishing An Insider Threat Team
    July 20, 2016 | Joseph Blankenship

    Insider threats are a real risk to business because they threaten both customer and employee trust. Accidental or malicious misuse of the firm's most sensitive and valuable data can result in...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Security User Behavior Analytics (SUBA)

    Use SUBA To Enhance Security Analytics

    Protecting the enterprise against unknown internal and external cyberthreats is a critical priority on the agenda of every CISO. Security user behavior analytics (SUBA) solutions promise to provide...

  • For Security & Risk Professionals

    Report

    Report Healthcare's IoT Dilemma: Connected Medical Devices

    Separating Fact From Fiction: The Real Risks Connected Medical Devices Pose
    May 20, 2016 | Chris Sherman

    The healthcare industry is coming off its worst year for data breaches, leaving patients and consumers wondering just how healthcare delivery organizations (HDOs) plan to turn things around....

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Market Imperatives

Region

Vendor

Analyst