Skip to main content
37 results in Reports
 

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
Refine
  • Security & Risk
  • Retail Credit

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Top Trends Shaping Identity Verification (IDV) In 2018

    Post-Equifax Breach, IDV Aggregators Will Cater To Multifaceted IDV Requirements
    March 29, 2018 | Andras Cser, Merritt Maxim

    In the face of increasing identity theft, stricter compliance regulations, and the push for online customer acquisition, reliable, accurate, cost-effective, and easy-to-use identity verification...

  • Report Equifax Exposed Two Massive Systemic Risks

    Flaws In The Data Economy Will Make Future Breaches Even More Frequent And Damaging
    December 19, 2017 | Amy DeMartine, Jeff Pollard, Heidi Shey

    In September 2017, Equifax announced a breach of sensitive personal information of 143 million US consumers, as well as consumers in the UK and Canada. The scale and scope of the breach foretell...

  • Report No More Chewy Centers: The Zero Trust Model Of Information Security

    March 23, 2016 | John Kindervag

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based...

  • Report CISOs Need To Add Customer Obsession To Their Job Description

    September 4, 2015 | Martin Whitworth

    Security is an essential component of doing business in today's digital world, and, increasingly, customers will not be willing to hand over their valuable personal information if they believe it...

  • Report The Cybercriminal's Prize: Your Customer Data And Intellectual Property

    September 2, 2015 | Heidi Shey

    Protecting customer data such as credit card information, log-in credentials, and other personally identifiable information (PII) is one of the top priorities for both security and risk (S&R)...

  • Report Prioritize Tokenization To Secure The Payment Chain

    EMV Is Not A Panacea For Card Payment Vulnerabilities
    April 27, 2015 | Andras Cser, Ed Ferrara, John Kindervag

    Is the credit card as US consumers know it dead? With the recent massive credit card data breaches at retailers such as Target and Home Depot, the payment industry is ripe for change. In this...

  • Report Detecting Cyberthreats With Fraud-Based Advanced Analytics Technology

    New Security Analytics Capabilities Will Replace Traditional SIEM, And Security Service Providers Will Lead The Adoption
    August 4, 2014 | Ed Ferrara

    Security and risk (S&R) professionals know that cyberattacks are often the first step in the complex dance of credit card theft and the fraud that results. Cyberattacks take many forms and affect...

  • Report Listen To Your Customers To Meet Financial Regulations

    The Consumer Financial Protection Bureau Is Changing The Face Of Customer Care
    July 14, 2014 | Renee Murphy

    Financial services firms face a new regulator in the Consumer Financial Protection Bureau (CFPB) that demands they pay more attention to customer complaints about services or products. The new...

  • Report Quick Take: Apple Positioned For Key Role In Secure Payment Processing, Fraud Prevention

    Touch ID, NFC, And iTunes Are Key Ingredients For A Payment Ecosystem Offering Superior Client-Side Fraud Management
    June 5, 2014 | Andras Cser

    On Monday, June 2, 2014, at their Worldwide Developer Conference, among a number of other things, Apple announced that it has opened up its fingerprint reader, Touch ID, to third-party...

  • Report Big Data In Fraud Management: Variety Leads To Value And Improved Customer Experience

    October 16, 2013 | Andras Cser

    Forrester defines "big data" as the techniques and technologies that make handling data at extreme scale affordable. The hope is that organizations can mine the huge volume and variety of data they...

  • Report Simplify Cybersecurity With PCI

    Policy And Procedures US Government Spotlight: The Security Architecture And Operations Playbook
    October 11, 2012 | Heidi Shey, John Kindervag

    US federal law, specifically the Federal Information Security Management Act (FISMA), requires US federal government agencies to adhere to National Institute of Standards and Technology (NIST)...

  • Report PCI X-Ray: Patch Management

    April 20, 2011 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Report PCI X-Ray: Application Security Checklist

    January 14, 2011 | John Kindervag

    This is a workbook that supplements the PCI X-Ray: Application Security Document

  • Report PCI X-Ray: Application Security

    January 12, 2011 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Report PCI X-Ray: Assessment And Testing Checklist

    June 23, 2010 | John Kindervag

    This checklist is provided as a concise and comprehensive workbook to help organizations deal with the different types of assessments and tests that security and risk professionals must perform to...

  • Report PCI X-Ray: Assessments And Testing

    June 15, 2010 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Report Demystifying Tokenization And Transaction Encryption, Part 2: When To Double Down

    Knowing When To Double Down On Your Bets
    April 15, 2010 | John Kindervag

    You don't need a crystal ball to see the future of credit card security. The goals are clear — make cardholder data (CHD) impossible to translate into money, and create disincentives for...

  • Report Case Study On Fraud Management: An eRetailer Reduces Order Reviews By 83%

    April 9, 2010 | Andras Cser

    For online retailers, the cost of fraud is more than just lost revenue — detecting and preventing fraud can slow order fulfillment, harm brand images, and increase the number of fraud analysts...

  • Report PCI X-Ray: Wireless Guidelines

    April 7, 2010 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Report Demystifying Tokenization And Transaction Encryption, Part 1: Get Ready To Place Some Bets

    April 7, 2010 | John Kindervag

    You don't need a crystal ball to see the future of credit card security. The goals are clear: Make cardholder data (CHD) impossible to translate into money, and create disincentives for...

  • Report PCI Unleashed

    Using PCI As A Foundation For Security And Risk Management
    January 11, 2010 | John Kindervag

    PCI is controversial. As with any business requirement, it has its good parts and bad parts. Too many companies spin their wheels and complain about what they perceive as the negative or unjust...

  • Report The PCI Unleashed Framework

    January 8, 2010 | John Kindervag

    The PCI Unleashed Framework is designed to logically organize the PCI requirements so that it is easy to understand and extend. The framework shows that there is an overall security organization...

  • Report PCI X-Ray: Physical Security

    December 7, 2009 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Report PCI X-Ray: File Integrity Monitoring

    October 26, 2009 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Report PCI X-Ray: Network Segmentation

    July 17, 2009 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • 1
  • 2