Shoulder Surfing The Friendly Skies

When you fly nearly every week, you can get pretty bored on a plane. When I am sick of working, playing games, or watching movies, my latest distraction is checking out laptop screens. Sometimes I'm curious what movie you are watching...

Expense In Depth And The Trouble With The Tribbles

Expense In Depth And The Trouble With The Tribbles

You remember the tribbles don't you? The cute, harmless looking alien species from the second season of the original Star Trek that turn out to be anything but benign. They are born pregnant and reproduce at an alarming rate. The...

InfoSec, Structural Engineering, And The Security Architecture Playbook

Hammurabi understood that firm structure must be designed into everything that was built. Unfortunately, this is not a lesson that we in the networking world have truly understood and taken to heart yet. Every year many organizations...

Risk Management & Business Technology Resiliency – What’s Changed Since 2009

Take a second to think back to the year 2009. The US was in the thick of the financial crisis; companies were slashing budgets, and the unemployment rate was in double-digits. And do you remember a little thing called the “swine flu”?...

Hurricane Sandy Shows A Dramatic Improvement From Botched Katrina Response

Hurricane Sandy Shows A Dramatic Improvement From Botched Katrina Response

I spend a lot of time focusing on communication in this post because over and over again, emergency and business continuity professionals always tell us that it’s the part of contingency planning that people don’t appreciate enough....

A Chat With Trend Micro: Consumer Security Apps And Services Extend Beyond Security And Privacy

Consumer security has come a long way from simply antivirus software for PCs. Mobile security is undoubtedly on everyone’s minds at this point (oh no! device loss, malware, my apps are spying on me!), but that’s only one factor...

Enterprise “Overextended”? You Need To Evolve Your Identity Strategy

Legacy identity and access management approaches don't stand a chance against today's cybercriminals and resourceful fraudsters. Learn how to future-proof your identity strategy with Forrester's Identity and Access Management Playbook....

The Biggest Risk To BC Preparedness – 3rd Party Risk

If you’re not assessing the BC readiness of your partners through assessments of their capabilities, reviews of their plans, testing and negotiation of specific uptime SLAs, your BC program and strategies are incomplete. You’re simply...

What Are S&R Pros Doing About Data Security And Privacy?

Data security consistently tops the laundry list of security priorities because it must. Organizations are collecting data, creating data, using data, and storing data in some way or another. Mishandle data or disregard privacy, and...

Cloud-Native Identity Management Is Suddenly Looking Like A Winner

Doing access management with the help of cloud-based services is a pretty comfortable proposition by now. For over a decade, we've been doing federated single sign-on to and from apps that are themselves in external domains. Looking...

When It Comes To Data Security, You Don’t Need A Silver Bullet, You Need A Framework

There is truth to the meme, “data is the new oil”. Data is the lifeblood of today's digital businesses, and for economic and even political gain, highly skilled cybercriminals are determined to steal it. Meanwhile, customers around...

AVG: What They’re Doing Right, Where They (And Other Vendors) Just Make Noise, And What It Means For S&R Pros

Policy and sentiment about privacy in the consumer realm will shape your organization’s privacy policy and privacy program.

President Obama Cares About Records Management – Do You?

Last week, following on President Obama’s memorandum on managing government records, the Office of Management and Budget (OMB) and the National Archives and Records Administration (NARA) issued a records management (RM) directive. The...

CISOs Need To CYA - 'Comprehend Your Assets'

Asset management is something that many CISO tend to skip over, often in the belief that information assets are managed by the business owners and hardware assets are closely managed by IT. Unfortunately, I知 not convinced that either...

Large Telecoms Offer A Full Menu Of Security Services, But Not Without A Little Indigestion

Last month, my Forrester colleague Ed Ferrara and I spent a couple days in Paris with Orange's management team for their annual analyst event. Overall I was impressed with Orange’s innovation in business service offerings as well as...

Observations from Black Hat - More Defense Please

Black Hat is in transition, doing soul searching on the future direction of the conference. The primary focus of Black Hat has traditionally been on offense. Attacks are sexy, defense …. not so much.

Deliver The Anywhere, Anytime, Any-Device Promise Safely And Securely

Mobile security and operations continues to be one of the hottest topics for organizations across industries. Mobility holds the promise of fostering new innovations, reaching new audiences and, most importantly, creating...

Go Beyond Technology To Build An Effective Security Practice

Increasingly, Security & Risk (S&R) Professionals are not only being asked to protect the organization from hackers but also to protect their organization’s brand and competitive advantage whilst enabling efficient and agile business...

Think Differently

For too long the information, security industry has looked at information homogenously and assumed that all hacking is created equally because all information is created equal. This could not be further from the truth.

Six Security Properties Every Mobile App Developer Should Know By Heart

Six Security Properties Every Mobile App Developer Should Know By Heart

Think you developed a secure mobile app? Think again. Many mobile app developers have a naive notion of app security that leads them into believing their apps are secure when they are not.

Load More