10 results in Reports
 

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
Refine
  • Security & Risk
  • Financial Services
  • Business Technographics

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Top Trends Shaping Identity Verification (IDV) In 2018

    Post-Equifax Breach, IDV Aggregators Will Cater To Multifaceted IDV Requirements
    March 29, 2018 | Andras Cser, Merritt Maxim

    In the face of increasing identity theft, stricter compliance regulations, and the push for online customer acquisition, reliable, accurate, cost-effective, and easy-to-use identity verification...

  • Report Security Budgets 2018: Financial Services And Insurance

    New Initiatives Require Security To Take An Expertise-On-Demand Approach
    March 22, 2018 | Jeff Pollard

    Data breaches, regulation, stiff competition for talent, and decentralized technology spending are still major challenges for security leaders in the FSI industry. We compare the budgets of...

  • Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • Report Market Overview: Data Loss Prevention

    DLP Suite Adoption Holds Steady As DLP Becomes A Feature And Managed Services Offer An Attractive Option
    May 2, 2016 | Heidi Shey

    Policies to control data use and movement require enforcement mechanisms. Data loss prevention (DLP) capabilities give security and risk (S&R) professionals the means to enforce those policies and...

  • Report No More Chewy Centers: The Zero Trust Model Of Information Security

    March 23, 2016 | John Kindervag

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based...

  • Report The Cybercriminal's Prize: Your Customer Data And Intellectual Property

    September 2, 2015 | Heidi Shey

    Protecting customer data such as credit card information, log-in credentials, and other personally identifiable information (PII) is one of the top priorities for both security and risk (S&R)...

  • Report Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals
    June 19, 2014 | John Kindervag, Rick Holland, Heidi Shey

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

  • Report Five Steps To Build An Effective Threat Intelligence Capability

    January 15, 2013 | Rick Holland

    Against today's mutating threat landscape and sophisticated cybercriminals, security and risk (S&R) professionals are outgunned and outmatched. The traditional strategy of waiting for an alert and...

  • Report Q&A: Cyberinsurance Fundamentals For Security And Risk Professionals

    July 11, 2012 | Andrew Rose

    Since cyberinsurance first emerged in the late '90s, the number of available policies, the scope of those policies, and the number of insurers offering them have all significantly increased. Due to...

  • Report Understanding Legal And Regulatory Risks In Social Media

    January 5, 2012 | Brian W. Hill

    Even as social media adoption surges across the enterprise, security and risk (S&R) professionals have yet to fully understand and mitigate associated legal, compliance, and security risks. S&R...