20 results in Everything
 
Sort by:
Refine
  • Secure customers, protect the brand
  • Chase Cunningham

Search Results

  • Report Gauge Your ZTX Security Maturity

    Assessment: The Zero Trust Security Playbook
    October 11, 2019 | Chase Cunningham

    To convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Zero Trust Security Playbook
    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report The Zero Trust eXtended (ZTX) Ecosystem

    Strategic Plan: The Zero Trust Security Playbook
    July 11, 2019 | Chase Cunningham

    In the past two years, Forrester's Zero Trust security has exploded in awareness and plans for adoption. We've reached this market inflection thanks to the categorical realization from both...

  • Report How To Implement Zero Trust Security In Europe

    Large technology companies and the US Federal Government have adopted Zero Trust (ZT) as their next-generation security model. 2019 is the year that Zero Trust hits the mainstream in Europe....

  • Report Use Advanced Encryption For Data Security

    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

  • Report The Zero Trust eXtended Ecosystem: Networks

    The Network Continues To Be A Critical Point Of Control In ZTX
    January 2, 2019 | Chase Cunningham

    Anywhere packets pass is a place that can offer cybercriminals command and control of critical network assets, but it can also enable better security and ultimately help to build a Zero Trust...

  • Report Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences
    September 25, 2018 | Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to...

  • Report Using AI For Evil

    A Guide To How Cybercriminals Will Weaponize And Exploit AI To Attack Your Business

    The tools of artificial intelligence (AI), from text analytics to facial recognition to machine learning (ML) platforms, are transforming almost every aspect of business from personalized customer...