CSI: Your Network – Reconstructing the Breach

September 2017 was a busy month. Three major breach notifications in Deloitte, the SEC, and Equifax… and my first Wave dropped, coincidentally on Digital Forensics & Incident Response Service Providers. Following all this commotion, I had a client reach out and ask me how… How are investigators able to reconstruct digital crime scenes to identify […]

The B2B Breach Trifecta: Equifax, SEC, and Deloitte

The B2B Breach Trifecta: Equifax, SEC, and Deloitte As rumors emerged this morning about a compromise of consulting firm Deloitte, this becomes the third breach announced in just a few short weeks of organizations that share a similar profile: Each one is primarily – or exclusively – a B2B organization. There are some questions worth […]

Forrester Gathers Experts Across Disciplines To Tackle Europe’s Most Pressing Privacy, Security, and Trust Challenges

Fresh off a successful event in Washington, DC last week, we’re gearing up for Forrester’s Privacy & Security Forum Europe in London on 5-6 October. Forrester is gathering experts in cybersecurity, privacy, customer experience, regulatory compliance, identity management, personalization, blockchain, and a range of related topics.  Together, Forrester analysts and leaders from firms like ABN […]

Equifax Does More Than Credit Scores

Our reaction to the Equifax breach was similar to what we imagine many people went through. First, we wanted to know if we were affected? Second, What about our spouse and other immediate family members? Third, Better keep an eye on the old credit report or initiate a credit freeze. Since Forrester offers credit monitoring […]

Forrester’s Privacy And Security Forum Brings Diverse Experts To Devious Challenges

Well, the privacy hits keep coming: another breach, more than a hundred million people affected, untold losses for another company and its customers. Next week, September 14-15 in Washington DC, Forrester is gathering experts in cybersecurity, privacy, customer experience, regulatory compliance, identity management, personalization, and a range of other related topics to bring clarity to […]

Endpoint Security Solutions Offer A First Line Of Defense Against Cyberthreats

The number and complexity of cyberthreats are increasing. Traditional antimalware tools may not be adequate to protect your organization. As hackers create new, more-sophisticated malware, endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. Why is this important? Because employee endpoints are the interface between employees and […]

Blockchain Fever: The Potential And Challenges Of Blockchain Technology 

In last week’s episode of Forrester’s What It Means podcast, Principal Analyst Martha Bennett disentangles the hype from the reality of blockchain technology — and provides a passionate perspective on blockchain’s potential as an economic engine. Podcast transcript Victor Milligan: Hi, I’m Victor Milligan. Jennifer Isabella: And I’m Jennifer Isabella. Victor Milligan: Your co-hosts for Forrester’s podcast, What It Means, where we explore the […]

Customer Trust And Loyalty Determine Success On The Dark Web, Too

  This is a guest post by Salvatore Schiano a researcher serving Security & Risk Management professionals The dark web is an underground marketplace for drugs, stolen credentials, stolen financial and medical records, and other illicit products and services.  Cybercriminals use it to monetize breached data but they also use it to buy and sell exploits […]

You Deserve What You Tolerate…

After reading through some other blogs and strategy papers over the weekend, (Don’t judge me. To some of us, this activity constitutes a good time…Yes, lame…I know.) I saw what appeared to be an underlying theme across the narratives I’d read: Security tolerates failure. It’s understandable that it happens, but I think, if we are […]

US Ruling Creates A Privacy Nightmare For US Cloud Providers Overseas

On August 14th, Judge Richard Seeborg of the U.S. District Court for the Northern District of California upheld a ruling requiring Google to turn over Gmail data stored overseas. The ruling seems to be in conflict with a U.S. Court of Appeals ruling in Microsoft v. United States where the court ruled that Microsoft does […]

Black Hat Buzzword Bingo 2017

Every year at Black Hat, the buzzword factory is in full swing.  Last year the word of the day was Artificial Intelligence or Machine Learning (or in the off chance you met with someone who knew what they were talking about they would call it “AI or ML”).  The year before that, the word of […]

Applying Our Research To Black Hat 2017

I summarized RSA 2017 in the following way: It’s a bit like the supermarket, you’ll make far healthier choices if you stick to the outer aisles. Well, Las Vegas B-Sides, Black Hat, and DefCon are taking place this week and since these events differ in tone, audience, and participants, I’ve updated my advice: We’ve gone […]