5 results in Reports
 
Sort by:
Refine
  • Governance Risk & Compliance (GRC)
  • Josh Zelonis
  • Secure customers, protect the brand

Featured content

The Governance, Risk, And Compliance Playbook For 2020

Take On More Business Risk Using A World-Class GRC Program

Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...

Search Results

  • Report Top Cybersecurity Threats In 2020

    Landscape: The Zero Trust Security Playbook
    January 24, 2020 | Josh Zelonis, Sandy Carielli

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...

  • Report The Forrester Wave™: Vulnerability Risk Management, Q4 2019

    The 13 Providers That Matter Most And How They Stack Up
    October 17, 2019 | Josh Zelonis, Trevor Lyness

    In our 14-criterion evaluation of vulnerability risk management providers, we identified the 13 most significant ones — Brinqa, Digital Defense, Expanse, Kenna Security, NopSec, Outpost24, Qualys,...

  • Report Video: Protect Your Organization From Business Email Compromise (BEC) Attacks

    Watch Our Video To Understand A Real-Life BEC Attack And How To Protect Against These Frauds And Scams
    May 8, 2019 | Josh Zelonis, Andrew Hogan

    Alongside other scams, fraudsters and cybercriminals use business email compromise (BEC) attacks to convince unwitting employees to wire money, grant access to payment accounts, or share sensitive...

  • Report The Digital Risk Protection Market In 2019

    The First Cyber Intelligence Capability You Should Invest In
    April 19, 2019 | Josh Zelonis, Trevor Lyness

    This report is a deep dive into the digital risk protection market. We review where we see the market evolving as well as the different types of buyers and use cases for digital risk protection...

  • Report Planning For Failure: How To Survive A Breach

    Organization: The Zero Trust Security Playbook

    Cybercriminals are using more-sophisticated attacks to steal valuable intellectual property and the personal data of your customers, partners, and employees. Their motivations run the gamut from...

Content Type

Apply

Filters

Region

Vendor