Making The Smart City Safe And Secure

Forrester IT

Composed of the internet of things, “smart cities,” aimed to optimize operations, present new security and privacy […]. government IoT security physical security security & risk digital transformation IoT Security & Risk

Developer Security Champions Are Needed Now More Than Ever

Forrester IT

Developer security champions are members of the development team that can translate application security into a language that the rest of the developers can understand. These champions embed application security knowledge where it’s needed most: with the dev team.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Navigating the European 5G Security Debate

Forrester IT

age of the customer IoT security network security security & risk security architecture zero trust security framework (ZTX

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Gartner Top 9 Security and Risk Trends for 2020

CEB IT

The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges. Security

Trends 311

Translating Security For Small Business

Forrester IT

age of the customer security & risk #cyberinfluence #ciso CEO cybersecurity digital business digital strategy Security & Risk small business Zero TrustThis week is BlackHat. The annual Hacker Summer Camp as many folks call it.

The 15-Minute, 7-Slide Security Presentation for Your Board of Directors

CEB IT

When the request comes in to give a cybersecurity presentation to the board, security leaders should jump at the chance to educate the executives. Security and risk leaders will be presenting to the board at least on an annual basis, with some on a more frequent rotation. .

The Problem with Artificial Intelligence in Security

CTOvision

Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

Product Security And Surveillance Capitalism: Ring and Avast Fumble Privacy, Data Security, and Third-Party Risk

Forrester IT

Multiple security and privacy issues have plagued the physical security device maker, it’s responded poorly by casting blame on users, and following that the EFF identified that the Ring app is littered with third party trackers. It’s been a rough couple of months for Ring.

Make No Mistake — Microsoft Is A Security Company Now

Forrester IT

Microsoft has announced support for macOS in its rebranded Microsoft Defender ATP product, taking this product from being an offering that could be considered an add-on for hardening its own operating system to a multiplatform security solution.

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

Enterprise Security Vendors Need An Infusion Of Open Source Culture

Forrester IT

This week, I attended IBM’s fifth annual Security Summit in New York City, an exclusive event for a who’s who of IBM’s security customers. age of the customer security & risk collaboration innovation open source Security & Risk

New Technologies Expand The Physical Security Portfolio

Forrester IT

In this new era of social distancing, the physical security world may seem less relevant. Age of the Customer digital transformation security risk management emerging technology employee experience Security & Risk

The Forrester Wave™: Managed Security Services Providers (MSSPs), Europe, Q4 2018

Forrester IT

I published my first Forrester Wave™ today, covering the managed security services provider (MSSP) market in Europe.

Security & Risk 2019: Peering Into The Crystal Ball – Security Edition

Forrester IT

Security and risk pros have the opportunity to shape the future of technology and business in ways we might have only dreamed of two years ago. cybersecurity security & risk zero trust promoted

Hire the Right Teachers for Better Security Awareness

CEB IT

This module on avoiding phishing scams at work is something every employee should want to know about and yet, like many security programs, this one is creating very little engagement. Many employees view security training as boring and hard to understand. Dedicate security resources.

Maintain Your Security Edge: Develop And Retain Cybersecurity Talent

Forrester IT

cybersecurity information security retention management security & risk staff development & succession management Security & RiskAs an industry, we gripe about hiring and struggle with retention.

A Small Victory For Securing The US Bulk Power System

Forrester IT

It is long overdue to secure the United States’ bulk power system supply chain. Cybersecurity Trends energy & utilities security risk management supply chain management cybersecurity Government Security & Risk utilities

System 226

The Security Yearbook by Richard Stiennon

CTOvision

I am so excited to now have an autographed copy of The Security Yearbook by Richard Stiennon. Cyber Security News BooksRichard is a prolific writer, a fantastic speaker, and is known the world over as perhaps the most savvy of all analysts in the cybersecurity field.

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Forrester IT

Today we released our 2019 Security & Risk Recommendations report. We collected contributions from our colleagues across the Forrester Security & Risk team to identify the most important actions security leaders should take in 2019.

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets.

The Security And Privacy Implications Of Drones

Forrester IT

Yet while drones introduce a range of use cases, the growth of drones also represents a new physical threat that demands the attention of security […]. age of the customer security & risk Drones emerging technology Physical Security Security & Risk

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility.

Recent HIPAA Settlements Highlight The Weaknesses In Healthcare Security

Forrester IT

security & risk cybersecurity healthcare Security & RiskHindsight is 20/20; it’s easy to look back on past mistakes and identify ways to prevent them from reoccurring, especially when it comes to breaches reported on the Office of Civil Rights (OCR) “Wall of Shame”.

PSD2 Security Requirements Are Restricting Fintech Innovation

Forrester IT

I have recently released a new report looking at the second phase of the Payment Services Directive (PSD2) and its security requirements along with my colleagues Jacob Morgan and Andras Cser. age of the customer banking financial services security & risk

The Security Snapshot: Embracing The New Norm

Forrester IT

The novel coronavirus is also affecting security and risk […]. Age of the Customer security risk managementThe outbreak of the novel coronavirus in early 2020 has created unprecedented societal and economic changes globally.

New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

The Security Snapshot: 10-Year Challenge

Forrester IT

Besides the security concerns of social media sites potentially mining […]. security & riskAt the start of the new year, a meme called the 10-Year Challenge went viral.

Extend your team with security champions

Forrester IT

S&R pros can’t build a security culture by themselves. Security champions act as extra members of the security team; these people have connections across the organization and can translate security-speak into a language that everyone can understand.

A Conversation With Quantum Security Practitioner Jane Melia

CTOvision

In this OODAcast, OODA CTO Bob Gourley was joined by Dr. Jane Melia of QuintessenceLabs to dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring […]. CTO News Jane Melia OODA OODAcast Quantum Computing Quantum Security QuintessenceLabs

Security So Simple A 10-Year-Old Can Do It

Forrester IT

age of the customer security & risk IAM identity and access Security & Risk Zero TrustIt’s the summertime, and my daughters are home from school.

The Future Of The CISO – Six Types Of Security Leaders

Forrester IT

age of the customer chief information officer (CIO) Information Technology security & risk CISO cybersecurity digital transformation future of ciso Security & RiskWhen starting a project like the Future of the CISO – it’s a daunting exercise. While we don’t always share the background inspiration for our research, this time it’s quite important and will shed some light on how we arrived here.

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

The F5 Acquisition Of Shape Security: An Insider’s View

Forrester IT

David Holmes formerly worked for both F5 Networks and Shape Security. age of the customer security & risk security architecture

Elevate Security: An OODAcon 2020 Future Proof Sponsor

CTOvision

Elevate Security is a sponsor of Future Proof, our 2020 OODAcon. Their co-founder Masha Sedova has been a past speaker at our previous FedCyber event series, and is a widely known practitioner who led successful security training activities at Salesforce.

Introducing The Forrester New Wave™: Connected Medical Device Security, Q2 2020

Forrester IT

We are thrilled to announce that “The Forrester New Wave™: Connected Medical Device Security, Q2 2020” is now live. This report will help you understand how the top eight vendors in the emerging medical device security space stack up against 10 different criteria.

Top 5 Security & Risk Reports in Q1 2020 (Not Written By Me)

Forrester IT

It is a humbling to work with a team of talented individuals like the ones I work with on Forrester’s Security & Risk team. Age of the Customer security & risk authentication CISO Compliance covid-19 governance pandemic security and risk Top 5 Zero TrustThis week, I’m highlighting 5 reports some of these fine folks published in Q1 that I got a lot of value out of, and I think you will too. Optimize […].

Fugue: Autonomous Cloud Security and Compliance

CTOvision

Fugue automates enterprise cloud security and compliance enforcement to prevent data breaches, policy violations, and system downtime. Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Are Your New Remote Workers Visible to Security Operations?

CEB IT

While this move creates obvious challenges for IT in terms of infrastructure and capacity, it’s also creating challenges for security teams as they push to scale remote work on a rapid and global level. Lack of visibility does not equate to a lack of security vulnerabilities.

Making the case for cloud-based security

CTOvision

Read why Aaron Tan says that companies should embrace cloud based security options on Computer Weekly: The pace at which threat actors are carrying out cyber attacks has been accelerating […].