Do Your Company’s Research Practices Lead To Better Decision Making?

Forrester IT

Do research!” And while I’m happy that so many people are recognizing the value of research as a key to business success, […]. age of the customer user experience design research org structures (UX) user research“Understand your customers!

New Research: What Blockchain Means For Advertisers

Forrester IT

Today’s big brands have come to grips with a new advertising reality: Finding and successfully engaging with their best prospects and customers is more complicated than ever. But it’s not just rapidly changing consumer behavior that’s to blame.

Navigate Forrester’s Data Economy Research

Forrester IT

It’s not hard to see the signs that the data economy is heating up. Virtually all decision makers want to be insights-driven. They mine their own data, yet increasingly they want incremental insights that drive further differentiation and competitive advantage.

Kicking Off Our New Research On Autonomous Finance: FORR/3 Video

Forrester IT

Forrester has recently kicked off some new research focusing on services and companies that make financial decisions and take action on behalf of consumers.

Video 186

Meet Your New Security Research Analyst

Forrester IT

Meet David Holmes, the new analyst on the Security and Risk team. age of the customer

Researchers warn of new support scam malware

Computer Weekly

Security researchers have identified a new strain of support scam malware and a way of clearing up infected machines

Research Announcement — Asia Pacific Cybersecurity Consulting Providers, Q4 2019

Forrester IT

Research announcement: Another APAC Forrester Wave™ is coming. This time I will be evaluating cybersecurity consulting providers in Asia Pacific. Gather round! The cybersecurity consulting market has been alive and well in APAC since I began my career many years ago.

Forrester 2019 Enterprise BI Platform Waves ™ Research Update

Forrester IT

As the BI market and the technology continue to evolve, so does our research. Forrester has just published 2019 refresh of out Enterprise Business Intelligence (BI) Platforms Waves ™.

(another) RESEARCH ANNOUNCEMENT: A CISOs Guide To Our Research About The People Side Of Security

Forrester IT

This time it’s short and it summarises our suite of awareness, behaviour & culture research (security ABC )! It doesn’t rain, it pours, and I’m so pleased to be announcing yet another report.

2018 Marked 20 Years of Customer Experience Research at Forrester!

Forrester IT

It was 20 years ago, all the way back in September of 1998, when we inaugurated our customer experience research by publishing our first report about CX. I didn’t want to leave 2018 without noting a milestone for all of us here at Forrester who cover customer experience.

IoT security threat is real, says researcher

Computer Weekly

The security threat posed by IoT devices is not hype, says security researcher James Lyne

Research Announcement: Cybersecurity Incident Response Services Wave

Forrester IT

I’m getting ready to kick off a Forrester Wave on Cybersecurity Incident Response Services that should be viewed as a refresh of the Digital Forensics and Incident Response Service Providers Wave published in September of 2017.

5 Point Guide to Publishing a Research Paper in a STEM Journal

Kitaboo

In the wake of such developments, many publishing houses have revised the rules that need to be followed by aspirants wanting to publish their research papers. With the focal point being the logic behind research and its successful outcome, the foundation for the writing stage is laid.

New Research Survey: Video Technologies For CX And EX

Forrester IT

We’ve kicked off some new research, and we need your help. Our Forrester Tech Tide™ aims to help companies make investments in video technologies for customer and employee experiences. We’re currently fielding a survey for vendors, end users, and experts who use video technologies.

Video 185

Researchers find trove of 1.4 billion credentials

Computer Weekly

Security researchers have discovered what is believed to be the largest aggregate database found in the dark web to date, prompting fresh calls for improved identity management

Encryption keys too predictable, warn security researchers

Computer Weekly

Encryption keys are not as random as most people think, which means encrypting data is often not as secure as it could be, according to security researchers

GDPR could ramp up cyber extortion demands, warns researcher

Computer Weekly

The ransom demanded for stolen or encrypted data is likely to rise after the General Data Protection Regulation compliance deadline in May 2018, according to a cyber security researcher

Researchers Say Google Fiber Has Nationwide Potential

CTOvision

Bernstein Research, an equ. CTO Cyber Security DoD and IC Government Research Tech Trends Comcast Federal Communications Commission Google Google Fiber Internet service provider Net neutrality Sanford Bernstein Wall Street

Could Classifying AI Research Prevent Public Harm?

CTOvision

But some individuals are concerned about what could happen if information about AI research falls into the wrong hands. Headlines frequently feature news about advancements in artificial intelligence (AI). These developments collectively boost public interest in AI and help people imagine what’s possible. Hackers Are Typically One Step Ahead The increase in cybersecurity attacks has […]. Artificial Intelligence News

HP sponsors cyber security research chair at Birmingham University

Computer Weekly

Five-year research collaboration agreement will support government efforts to address cyber security challenges

HP 197

Testing is key to IoT security, says researcher

Computer Weekly

Building an effective testing process across all elements associated with a product is key to securing the internet of things, according to a researcher in the field

PowerShell security threats greater than ever, researchers warn

Computer Weekly

Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers

Paying ransomware attackers perpetuates attacks, says researcher

Computer Weekly

Continually evolving ransomware is among the threats organisations need to factor into their cyber defences in 2017, but only once they have taken care of the basics, says Kaspersky Lab researcher

OODA Research Report – The Iranian Threat

CTOvision

OODA has released the next report in our threat briefing series, this on focused on the country of Iran. This special report captures insights into the capabilities and intent of the Islamic Republic of Iran, with a special focus on the cyber domain. Our objective: provide insights that are actionable for business and government leaders […]. CTO Cyber War News

5 Point Guide to Publishing a Research Paper in a STEM Journal

Kitaboo

In the wake of such developments, many publishing houses have revised the rules that need to be followed by aspirants wanting to publish their research papers. With such an elaborate, yet rigorous process adopted to scrutinize research papers for publishing, there is no straightforward formula that dictates the process applicants must follow to get their research recognition. Always remain attentive towards how the research is being displayed throughout the paper.

HPE Superdome Flex in-memory supports Big Bang research

Computer Weekly

Stephen Hawkin’s Cosmos research group takes delivery of a Superdome HPC to enable it to test theoretical models of the Big Bang

Video: 2019 Research Themes (And A Few Resolutions)

Forrester IT

Like most people, I consider November a good time to start thinking about the clean slate a new year brings. There is lots of room to reflect on one year and get ready for the next one with a bit more, well, “resolve,” so to speak. I’ll be an all-around better person, for sure. A […].

McKinsey AI research finds slender user adoption outside tech

Computer Weekly

McKinsey Global Institute research finds artificial intelligence adoption to be exiguous and experimental outside the technology sector, but registers rapidly growing investment

Researcher uncovers UK government threat to privacy

Computer Weekly

Despite concerns about the draft Investigatory Powers Bill, a legal researcher has highlighted that existing legislation is a much bigger threat to privacy than most UK citizens realise

Poor IoT security could take down power grid, warns researcher

Computer Weekly

A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids

Three-quarters of enterprises collecting IoT data, says 451 Research

Computer Weekly

A study of IoT buying plans by analysts at 451 Research shows robust growth ahead during 2017

Birmingham Uni beefs up network automation, virtualisation to support research

Computer Weekly

The University of Birmingham has deployed a Brocade switching infrastructure and network virtualisation to support the needs of its research teams

Researcher finds over 711 million compromised email accounts

Computer Weekly

A security researcher has discovered a spambot using more than 711 million compromised email accounts to spread data-stealing malware

Design And Research Teams Are Scaling But Not How You’d Think

Forrester IT

When I talk to design leaders these days, the number one question on their minds is how to scale to meet the demand for design and research. to “how do we get more design and research?”

Introducing Autonomous Finance: Forrester’s New Research On Algorithm-Based Financial Services

Forrester IT

People’s lives are becoming ever more automated as millions of algorithms make decisions — and, in some cases, take actions on those decisions — on behalf of a consumer.