Security & Risk
Identity and Access Management remain a massive headache for IT security professionals
When I first became research director of Forrester's S&R team more than five years ago, I was amazed to discover that 30% to 35% of the thousands of client questions the team fielded each year were related to Identity and Access Management(IAM).
May 20, 2015 4:57:00 AM Read Full Post
Hunting for practical solutions amidst a tech fashion parade
Forrester’s Security and Risk team will have a lot of analysts out once again for this year’s RSA Conference. After all these years (12 for me!) we have to balance our excitement to see old friends and colleagues with our cynicism that says it will be a week of empty buzzwords just slightly updated from those we heard last year.
April 17, 2015 10:37:00 AM Read Full Post
Reputational risk is growing and IT security and risk professionals need to understand it
Risk professionals aren’t prepared for the age of the customer. Empowered consumers and changing market dynamics are upending longstanding business models and lines of operation, but risk professionals largely stand pat, and continue to neglect risks related to their organizations’ most critical asset – company reputation.
April 13, 2015 9:45:00 AM Read Full Post
Cloud Will Transform Managed Security Services
The movement to cloud is fast changing the method companies will deploy and consume security services. The number one issue that drives the adoption of managed security services (MSS) and the business of managed security service providers (MSSPs) is complexity reduction.
February 17, 2015 10:03:00 AM Read Full Post
IoT and wearable tech are all the rage at CES but there is an elephant in the room
The CES Expo has a number of specific areas of coverage including fitness and health, wearables, connected home, family safety, and some young innovative companies located in the startup area of the section.
January 08, 2015 10:28:00 AM Read Full Post
Beware executives bearing gifts...
If you’re a security and risk leader, it’s either the best of times or the worst of times. Today, it feels as if not a week goes by without yet another revelation of a large scale cyberattack targeting a trusted corporate brand.
December 02, 2014 9:15:00 AM Read Full Post
Are you in tune with your customers' attitudes?
We are in a golden age of data breaches - just this week, the United States Post Office was the latest casualty - and consumer attitudes about data security and privacy are evolving accordingly. If your data security and privacy programs exist just to ensure you meet compliance, you’re going to be in trouble.
November 13, 2014 9:52:00 AM Read Full Post
Getting a grip on adversary research
Mandiant's APT1 report changed the threat intelligence marketing game, and you would be hard pressed to find a cybersecurity company that doesn't have a research/intelligence team that produces threat actor reports.
November 10, 2014 8:59:00 AM Read Full Post
Key questions to ask
As we predicted in May 2012, user directories are moving into the cloud. Cloud workloads require that users who are authorized to access them are stored near the cloud workload and not just on-premise.
October 23, 2014 9:06:00 AM Read Full Post
The terminology minimises the struggle involved in ensuring end point security
During the past 18 months or so, we have seen the emergence of innovative endpoint security solutions. The list is long; it is hard to keep track of all the solutions in the space. In no particular order, here is a sampling: Bromium, Invincea,...
August 14, 2014 9:41:22 AM Read Full Post