Charts & Figures
-
-
Enterprises Are More Likely To Suffer Multiple Breaches
January 30, 2019
-
Search Results
-
Blog Eating Our Own Zero Trust Dog Food
February 1, 2019 | Chase CunninghamThe term “eat your own dog food” gets tossed around in the security/cyber industry regularly. Most of the time this phrase is pointed at vendors that are selling a solution. The point being made by...
-
Report Use Advanced Encryption For Data Security
Landscape: The Data Security And Privacy Playbook
January 30, 2019 | Chase CunninghamMore than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...
-
Report The Zero Trust eXtended Ecosystem: Networks
Strategic Plan: The Security Architecture And Operations Playbook
January 2, 2019 | Chase CunninghamAnywhere packets pass is a place that can offer cybercriminals command and control of critical network assets, but it can also enable better security and ultimately help to build a Zero Trust...
-
Blog The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018 — Truth
November 15, 2018 | Chase CunninghamWe just wrapped up five months of in-depth research focused on providing some clarity into what technologies from which vendors actually enable Zero Trust (not just talk about it). It didn’t...
-
Report The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018
Tools And Technology: The Security Architecture And Operations Playbook
November 8, 2018 | Chase CunninghamIn our 15-criterion evaluation of Zero Trust eXtended ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Centrify, Cisco, Cyxtera Technologies, Forcepoint,...
-
Blog Computational Propaganda: How Your Organization Could Be Attacked Like A Politician
October 18, 2018 | Chase CunninghamSending malicious payloads and packets is no longer the standard in threat operations. In today’s world of massive social media presence and influence, malicious actors can bring an...
-
Report Five Steps To A Zero Trust Network
Road Map: The Security Architecture And Operations Playbook
A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. ZT mandates that enterprises create microperimeters of control around their sensitive...
-
Report Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats
Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences
Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to...
-
Blog Zero Trust Technology Works; Excuses Don’t
September 4, 2018 | Chase CunninghamI have done a few exercises on implementing Zero Trust and Zero Trust eXtended (ZTX) in enterprises. The impetus behind these exercises from a strategy standpoint is that the participating...
-
Blog Zero Trust Technology Works; Excuses Don't
September 4, 2018 | Chase CunninghamI have done a few exercises on implementing Zero Trust and Zero Trust eXtended (ZTX) in enterprises. The impetus behind these exercises from a strategy standpoint is that the participating...
-
Report The Eight Business And Security Benefits Of Zero Trust
Business Case: The Security Architecture And Operations Playbook
In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...
-
Blog Security Is Embracing Zero Trust; Get Your Federal Team In Sync
August 10, 2018 | Chase CunninghamHistorically, industry is more forward-leaning than government when it comes to innovation — at least at the unclassified level. But unlike most industries, the US government is driving the...
-
Report Gauge Your ZTX Security Maturity
Assessment: The Security Architecture And Operations Playbook
July 19, 2018 | Chase CunninghamTo convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...
-
Report The Forrester Tech Tide™: Zero Trust Threat Prevention, Q3 2018
25 Technologies Underpin Zero Trust Threat Prevention
Zero Trust (ZT) threat prevention is increasingly critical to deny malicious attackers' access to enterprise assets. To accelerate their performance in ZT threat prevention, companies are...
-
Report Reduce Risk And Improve Security Through Infrastructure Automation
The Bad Guys Use Automation — Fight Fire With Fire
Today's security initiatives are impossible to execute manually. As infrastructure-as-code (IaC), edge computing, and internet-of-things (IoT) solutions proliferate, organizations must leverage...
-
Blog Cyber Conferences: It Shouldn’t Be This Way
June 7, 2018 | Chase CunninghamI recently saw another posting/photo from a friend in the industry that showed what amounts to “booth babes” at yet another conference; this time it wasn’t in Vegas, it was in Europe....
-
Report Secure Government Networks With Forrester's Zero Trust eXtended Framework
Build Customer Trust With Robust Security And Privacy Practices
Government networks are under attack from all manner of threats: enemy nations, hackers, rogue assets, malicious insiders, and more. Although governments have done well combatting threats and...
-
Blog The Self-Licking Ice Cream Cone Of Misery For S&R Pros Starts With Startups
April 26, 2018 | Chase CunninghamOver the past two weeks, I was at the annual shenanigan bonanza that is the RSA Conference and was also invited to sit on a “Shark Tank” panel for emerging technology startups in Miami. In the...
-
Report Using AI For Evil
A Guide To How Cybercriminals Will Weaponize And Exploit AI To Attack Your Business
The tools of artificial intelligence (AI), from text analytics to facial recognition to machine learning (ML) platforms, are transforming almost every aspect of business from personalized customer...
-
Blog Next-Generation Access and Zero Trust
March 27, 2018 | Chase CunninghamA few years ago, the concepts of microsegmentation and microperimeters for Zero Trust were championed by former Forrester analyst John Kindervag. He showed us how those concepts and their...
-
Blog Zero Trust on a Beer Budget
February 7, 2018 | Chase CunninghamI have a good friend who has a small business (roughly 100 employees and two office locations; everything lives in the cloud, no real “network” to speak of) that is doing well. A few weeks ago,...
-
Blog What ZTX means for vendors and users
January 23, 2018 | Chase CunninghamI am a huge fan of Zero Trust—the simplicity of the concept resonates with clients that read the research authored previously by John Kindervag and more recently myself. The framework’s intrinsic...
-
Report The Zero Trust eXtended (ZTX) Ecosystem
Extending Zero Trust Security Across Your Digital Business
January 19, 2018 | Chase CunninghamSecurity pros are still scrambling for new and effective ways to protect their networks and combat the impacts of hacking and exploitation. With Forrester's Zero Trust Model of information...
-
Report The Zero Trust eXtended (ZTX) Ecosystem: People
Develop Your Zero Trust Workforce Security Strategy
December 5, 2017 | Chase CunninghamThe concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve...
-
Report Artificial Intelligence Will Revolutionize Cybersecurity
But Security Leaders Must View All Vendor Claims With Skepticism
Security vendors are inundating CISOs with products purporting to use artificial intelligence to dramatically improve the accuracy and speed of both threat detection and response. However, much of...
- 1
- 2