The Wayback Machine - https://web.archive.org/web/20130426092137/http://blogs.computerworlduk.com/security-and-risk/

Security & Risk

RSSSubscribe to this blog
About Author

Forrester Research is a technology and market research company that provides pragmatic advice to global leaders in business and technology.

Contact Author

Email Forrester


Recent Posts

Observations on the 2013 Verizon Data Breach Investigations Report

we are all targets

I was very excited to finally get a copy of the much-anticipated 2013 Verizon Data Breach Investigations Report (DBIR.) I have found the report to be valuable year after year. This is the 6th iteration and this year’s report includes...

Tags: apt, fireeye, forrester, information security, phishing, security, solera networks, verizon

How do S&R pros keep up with disruption?

A focus on business alignment can minimise the need to play catch-up

When I talk to security (S&R) leaders, they always tell me that in an ideal world, they would have enough advanced warning of impending business and technology disruptions in order to understand the security, privacy and overall risk implications and...

Tags: cloud computing, disruptive technology, forrester, risk, risk management, security, security and risk

Two-step verification will end consensual impersonation

Learning from the school of hard knocks

I recently advocated killing your password policies and applying some other techniques instead to make existing use of passwords more effective (including my hobby horse: take the user-experience sting out of rotating ordinary static passwords by pushing them out to...

Tags: apple, authentication, consumer behaviour, google, icloud, itunes, mobile authentication, oauth, password, password breach, strong authentication, two-factor authentication, world of warcraft

Avoid the social media binary

It can't be all or nothing with employees, Facebook and Twitter

Many organisations today get caught up in what I call the “social media binary,” where there are only two options to social media control: 1) Allow unrestricted access to social networks, and potentially expose the company to myriad security, regulatory,...

Tags: forrester, risk and compliance, social media, social media risk management, social media security

RSA 2013: The age of security commercialism

Lots of noise, too few surprises and too little differentiation

Walking on the RSA 2013 show floor, it was a chaotic, noisy, and energetic place, pulsing with excitement. The industry has reasons to celebrate; the security space is white hot, with more VC money pouring into the space than ever...

Tags: dell, fireeye, forrester, ibm, netwitness, rsa, security

Bit9's operational oversight is probably your operational reality

Be pragmatic, You can't protect everything

You are now no doubt aware that Boston-based security firm Bit9 suffered an alarming compromise, which resulted in attackers gaining access to code-signing certificates that were then used to sign malicious software. See Brian Kreb’s article for more details. (Symantec...

Tags: client security, cybersecurity, endpoint security, forrester, forrester's security maturity model, incident response, malware, security, symantec

A 'BYO' too far?

How many of us truly enforce the contractual requirements that prohibit sub-contracting for service providers? Do we even include such terms in employee contacts?

Undoubtedly, most of you will have seen the amazing story about the developer who secretly outsourced his own role to China, investing 20 percent of his annual salary to free up almost all his work time. The rouse came to light...

Tags: bob, china, forrester, outsourcing, securid, security, verizon, vpn

The Atlantic Ocean divides financial aspirations for CISOs in 2013

2013 could be a crucial time for security investment - while many firms have restricted spending for several years now, the threat has continued to escalate

As 2012 came to a close, we studied the financial position of many CISOs and asked about their expectations for 2013. Unsurprisingly, it was apparent that 2012 was another difficult year and that CISOs had been keeping their belts tight...

Tags: cloud computing, forrester, it business, risk management, security

A 2012 security incident recap by the numbers

Before we get too far along into 2013, I’d like to take a moment to reflect back on the events of 2012

Before we get too far along into 2013, I’d like to take a moment to reflect back on the events of 2012. Thanks to our friends at CyberFactors*, this is what we saw:Overall1,468 (publicly reported) incidents. This includes everything from...

Tags: cloud computing, forrester, public sector, security, social security number

Make a resolution: Kill your P@55W0rD policies

The password is not dead but...

It has finally become hip not just to predict the demise of passwords, but to call for their elimination. The recent Wired article makes an eloquent case about the vulnerabilities that even "strong" passwords are subject to, such as social...

Tags: authentication, bit strength, forrester, multi-factor authentication, password breach, password cracking, passwords, security, two-factor authentication