5 results in Reports
 
Sort by:
Refine
  • Andras Cser
  • Privacy

Featured content

The Data Security And Privacy Playbook For 2019

Protect Your Intellectual Property And Customer Data From Theft And Abuse

Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, and privacy...

Search Results

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Report Decentralized Digital Identity: A Primer For B2C Marketers

    Why Bring-Your-Own-Identity Is A Trend To Watch

    Your identity is more than the standard information on your driver's license or social security card. It also encompasses how you interact with brands, what you know, how you share elements of your...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

Content Type

Apply

Filters

Industry

Primary Role

Methodology