1,259 results in Everything
 
Sort by:
Refine
  • Security & Risk

Search Results

  • Report The Business Case For Security Awareness And Training

    How To Measure Changes In Security Behavior And Culture
    April 11, 2019 | Jinan Budge, Claire O'Malley

    Everyone has long recognized the importance of the human element to cybersecurity, yet we still see staff acting unwisely and inviting threat actors into our networks. It's clear that something...

  • Report The Forrester Wave™: Software Composition Analysis, Q2 2019

    The 10 Providers That Matter Most And How They Stack Up
    April 8, 2019 | Amy DeMartine

    In our 33-criterion evaluation of software composition analysis providers, we identified the 10 most significant ones — Flexera, FOSSA, GitLab, JFrog, Snyk, Sonatype, Synopsys, Veracode, WhiteHat...

  • Report Forrester Analytics: Cloud Security Solutions Forecast, 2018 To 2023 (Global)

    ForecastView Document
    April 1, 2019 | Jennifer Adams, Andras Cser

    As software, infrastructure, and platforms shift to the cloud, a new breed of security services continues to emerge and grow to address the security requirements. This data-driven report gives a...

  • Report Harden Your Human Firewall

    Engagement And Communication Tactics That Strengthen Security Culture
    March 25, 2019 | Jinan Budge, Claire O'Malley

    Building a strong security culture is no easy task. It requires strategy, vision, people, and the right attitude to change behavior and set a cultural shift in motion. This report highlights some...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    March 25, 2019 | Andras Cser, Merritt Maxim

    Your identity and access management (IAM) strategy must establish and explain the business need and value of IAM to technology and business leaders. It must also describe the current state, define...

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

  • Report Security Budgets Europe, 2019: Budgets Rise And Security Services Overtake Products

    March 21, 2019 | Paul McKay

    This year, European CISOs must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how European security...

  • Report The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2019

    The 15 Providers That Matter Most And How They Stack Up
    March 18, 2019 | Josh Zelonis

    In our 11-criterion evaluation of cybersecurity incident response services providers, we identified the 15 most significant ones — Aon, Booz Allen Hamilton, CrowdStrike, Cylance, Deloitte, EY,...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report The Forrester Wave™: Managed Security Services In Asia Pacific, Q1 2019

    The 11 Providers That Matter Most And How They Stack Up
    March 13, 2019 | Jinan Budge

    In our 28-criterion evaluation of managed security service providers (MSSPs) in Asia Pacific (AP), we identified the 11 most significant ones — Accenture, Deloitte, EY, IBM, Orange Cyberdefense,...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report Recruiting And Retaining Insider Threat Analysts

    To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts
    March 7, 2019 | Joseph Blankenship

    Whether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need...

  • Report Throw Away Your Current Application Security Metrics

    Match Application Security Metrics To Developer Speed
    March 1, 2019 | Amy DeMartine, Jeff Pollard

    Applications underpin customer engagement, but they also are the top external attack method for breaches. To avoid launching efforts that waste time, effort, and money, security leaders need...

  • Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019

    Forrester's Landscape Overview Of 21 Providers
    February 28, 2019 | Merritt Maxim, Joseph Blankenship

    A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...

  • Report How Insiders Use The Dark Web To Sell Your Data

    Financial Services Firms Need To Prioritize Monitoring For Insider Threats
    February 28, 2019 | Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report The Security Of Cryptocurrencies

    Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
    February 13, 2019 | Andras Cser, Heidi Shey, Jeff Pollard

    Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...

  • Report The State Of Business Continuity, 2018

    Risk Pros Are Expanding BC To Include Most Operational Risks
    February 11, 2019 | Stephanie Balaouras, Salvatore Schiano

    As 100-year floods and cyberattacks grow more frequent, and as organizations become completely dependent on complex technology, business continuity (BC) preparedness must be a cornerstone of a...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

  • Webinar Customer Call Centers: Dos And Don'ts

    February 7, 2019 | Andras Cser

    When we have the online channels (e.g., web, mobile app, etc.) all secured, fraudsters turn to the customer call center as an avenue to commit fraud. This webinar explains key types of fraud, best...

  • Report Build Your Security Organization

    Organization: The S&R Practice Playbook
    January 31, 2019 | Jeff Pollard, Paul McKay

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. This report examines key organizational challenges...

  • Report Use Advanced Encryption For Data Security

    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

Content Type

Apply

Filters

Region