Featured content
The Zero Trust Security Playbook For 2019
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Search Results
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Report New Tech: Cyber Ranges, Q3 2019
Forrester's Landscape Overview Of 14 Providers
Cyber ranges use a simulated breach environment to prepare your workforce for the stress, panic, and communication barriers they will face during a real cyberattack. In an inevitable cyberattack,...
-
Report Best Practices: Mitigating Insider Threats
Defend Your Organization Against The Threats Insiders Pose
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Report Lessons Learned: Managed Security Services, 2019
Critical Insights From Forrester Wave™ Customer References Every Security Leader Should Know
Despite the maturity of the managed security services provider (MSSP) market, security and risk pros and vendors far too often fail to sync up as true, successful partners. This report delves into...
-
Report Avoid Corporate Scandal Caused By The Surveillance Economy
A Guide For CISOs To Stop Unethical Surveillance Tactics Before They Start
Welcome to the era of widespread personal surveillance. Organizations have joined the government in collecting, analyzing, and storing oceans of personal data. The private sector is fully engaged...
-
Report The Business Case For Security Awareness And Training
How To Measure Changes In Security Behavior And Culture
Everyone has long recognized the importance of the human element to cybersecurity, yet we still see staff acting unwisely and inviting threat actors into our networks. It's clear that something...
-
Report Harden Your Human Firewall
Engagement And Communication Tactics That Strengthen Security Culture
Building a strong security culture is no easy task. It requires strategy, vision, people, and the right attitude to change behavior and set a cultural shift in motion. This report highlights some...
-
Report Top Recommendations For Your Security Program, 2019
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report Now Tech: Security Awareness And Training Solutions, Q1 2019
Forrester's Overview Of 20 Security Awareness And Training Solution Providers
You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...
-
Report Maintain Your Security Edge
Continuous Improvement: The Zero Trust Security Playbook
New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...
-
Report Predictions 2019: Cybersecurity
The US-China Trade War Will Revive Corporate Espionage Attacks Around The World
The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and...
-
Report Instill A Security Culture By Elevating Communication
Continuous Improvement: The S&R Practice Playbook
Traditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report How To Become A Superstar Security Leader
Vision: The S&R Practice Playbook
September 25, 2018 | Christopher McClean, Claire O'MalleyAs companies seek to innovate and engage customers through digital channels, they need superstar security leaders — business executives who know how to protect, support, and drive performance. This...
-
Report The Forrester Wave™: Emerging Managed Security Services Providers (MSSPs), Q3 2018
The 10 Providers That Matter Most And How They Stack Up
In our 24-criterion evaluation of the emerging managed security services providers (MSSPs) market, we identified the 10 most significant providers — Capgemini, CyberProof, InteliSecure, Kudelski...
-
Report The Forrester Wave™: Global Managed Security Services Providers (MSSPs), Q3 2018
The 14 Providers That Matter Most And How They Stack Up
In our 23-criteria evaluation of global managed security services providers (MSSPs), we identified the 14 most significant ones — Accenture, Alert Logic, AT&T Business, BAE Systems, CenturyLink,...
-
Report Key Security And Risk Insights From Clients' Top Questions
Advanced Cybersecurity Techniques And Identity Access Management Are Critical Challenges
Forrester's security and risk (S&R) research team fields thousands of inquiries from clients every year. In this report, we're sharing our conclusions from an analysis of more than 3,000 inquiries...
-
Report Protect Your Extended Ecosystem With Third-Party Cyber-Risk Scoring
Continually Quantify The Cyber Risk Of Your Third Parties For Actionable Insights
Managing the cybersecurity postures of your third parties is a crucial aspect of risk management. Third-party cyber-risk-scoring solutions are helping S&R pros identify, measure, and mitigate the...
-
Webinar Best Practices: Recruiting And Retaining Women In Cybersecurity
The cybersecurity industry is projecting a staffing shortage of 1.8 million unfilled jobs globally by 2022. Meanwhile, women represent just 11% of cybersecurity professionals worldwide. If chief...
-
Report The Rise Of The Cybersecurity And Privacy Lobby
Take The Lead On These Five Policy Issues That Will Shape The Future Of Security
Cybersecurity and privacy issues currently dominate tech public policy debate. Lobbyists, politicians, and academia are shaping the legal frameworks and regulatory requirements with which CISOs...
-
Report Best Practices: Recruiting And Retaining Women In Cybersecurity
Address Skill Shortages With A More Inclusive Culture
Despite its urgent and ever-growing importance, the cybersecurity industry is projecting a staffing shortage of 1.8 million unfilled jobs globally by 2022. Meanwhile, women represent just 11% of...
-
Report Protect Your Executives From Cybercriminals, Fraudsters, And Themselves
Key Steps To Shield Business Leaders From Cyberattacks, Social Engineering, And Virtual Imposters
Business executives are frequent, easy, and attractive targets for cybercriminals. In this report, we explain how cybercriminals and fraudsters target business leaders and how those executives' own...