1,258 results in Everything
 
Sort by:
Refine
  • Security & Risk

Search Results

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report The Security Of Cryptocurrencies

    Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
    February 13, 2019 | Andras Cser, Heidi Shey, Jeff Pollard

    Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...

  • Report The State Of Business Continuity, 2018

    Risk Pros Are Expanding BC To Include Most Operational Risks
    February 11, 2019 | Stephanie Balaouras, Salvatore Schiano

    As 100-year floods and cyberattacks grow more frequent, and as organizations become completely dependent on complex technology, business continuity (BC) preparedness must be a cornerstone of a...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

  • Webinar Customer Call Centers: Dos And Don'ts

    February 7, 2019 | Andras Cser

    When we have the online channels (e.g., web, mobile app, etc.) all secured, fraudsters turn to the customer call center as an avenue to commit fraud. This webinar explains key types of fraud, best...

  • Report Build Your Security Organization

    Organization: The S&R Practice Playbook
    January 31, 2019 | Jeff Pollard, Paul McKay

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. This report examines key organizational challenges...

  • Report Use Advanced Encryption For Data Security

    Landscape: The Data Security And Privacy Playbook
    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

  • Playbook The Data Security And Privacy Playbook For 2019

    Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, and privacy...

  • Report GRC Vision, 2019 To 2024

    Vision: The Governance, Risk, And Compliance Playbook
    January 25, 2019 | Renee Murphy, Christopher McClean

    Risk management professionals are used to helping steer their organizations through uncertainty, and as fast as business and technology are advancing, they should be looking five years into the...

  • Report The Future Of Endpoint Protection, 2019 To 2024

    Endpoint Security Will Focus On Apps' And Users' Behavior
    January 24, 2019 | Chris Sherman

    Security leaders have struggled for the past 20 years to balance effective endpoint security with good employee experience, and this challenge will only get tougher as attacks and technologies...

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Playbook The Governance, Risk, And Compliance Playbook For 2019

    Maximize Business Performance With A World-Class GRC Program

    Governance, risk, and compliance (GRC) programs are essential for protecting business value and maximizing business performance. Yet too many organizations lack well-defined GRC programs or neglect...

  • Report Now Tech: Security Awareness And Training Solutions, Q1 2019

    Forrester's Overview Of 20 Security Awareness And Training Solution Providers
    January 23, 2019 | Jinan Budge, Claire O'Malley

    You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...

  • Report The State Of Endpoint Security, 2019

    Buyers Demand Better Product Efficacy And Integrated Data Security
    January 22, 2019 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns to help security...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...

  • Report Now Tech: Managed Security Services In Asia Pacific, Q1 2019

    Forrester's Overview Of 19 Managed Security Service Providers
    January 16, 2019 | Jinan Budge

    You can use managed security services to rapidly transform your security operations, improve your talent diversity, increase your breadth of skills, and support your global business. But to access...

  • Report Build A High-Performance, Customer-Obsessed Security Organization

    Executive Overview: The S&R Practice Playbook
    January 16, 2019 | Christopher McClean

    CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...

  • Report Now Tech: Antiphishing Solutions, Q1 2019

    Processes: The Zero Trust Security Playbook
    January 8, 2019 | Joseph Blankenship, Nick Hayes, Claire O'Malley

    You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these...

  • Report Define A Road Map To Accelerate Your Security Program

    Road Map: The S&R Practice Playbook
    January 8, 2019 | Christopher McClean

    Turning strategy into action reveals a CISO's worth. A solid security road map is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...

  • Webinar Beware Of And Prepare For The Coming Data Integrity Crisis

    Companies increasingly rely on data and automated decision making to transform their business. This, however, means that the impact of a data integrity attack – where an attacker alters...

  • Report New Tech: Blockchain Identity (BCI) Management, Q1 2019

    Forrester's Landscape Overview Of 22 Providers
    January 3, 2019 | Andras Cser, Martha Bennett

    A new crop of blockchain identity (BCI) technologies, and the solutions they power, stand poised to unleash new paradigms in identity verification (IDV) and access policy enforcement, leading to...

  • Report Top Trends Shaping IAM In 2019

    Landscape: The Identity And Access Management Playbook
    January 3, 2019 | Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R)...

  • Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019

    Tools And Technology: The Zero Trust Security Playbook
    January 2, 2019 | Josh Zelonis, Joseph Blankenship

    Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...

Content Type

Apply

Filters

Region