2 results in Everything
 
Sort by:
Refine
  • Trevor Lyness
  • Vulnerability & Threat Management

Featured content

The Zero Trust Security Playbook For 2019

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report Forrester's Guide To Paying Ransomware

    Paying Ransom Can Be A Valid Recovery Option Based On Business Need And Circumstances
    June 5, 2019 | Josh Zelonis, Trevor Lyness

    Conventional wisdom says that when your company suffers a ransomware attack, you should never pay the ransom. But hardline conversations about whether to negotiate with cybercriminals takes a...

  • Report Show, Don't Tell, Your Developers How To Write Secure Code

    Use Application Security Testing To Educate Your Developers
    April 19, 2019 | Amy DeMartine, Trevor Lyness

    Applications are the most frequent attack vector for companies; as a result, security pros made application security their top priority in 2019. Application security can only improve, however, if...

Content Type

Apply