Forrester offers guidance on getting zero trust right and achieving security goals

Tighter budgets, a near-record level of projects to be done with a smaller staff and a rising number of malware-free attacks are a few of the many challenges taking the security team’s time away from zero trust. CISOs tell VentureBeat that consolidating their tech stacks to improve visibility, reduce costs and make progress on zero-trust frameworks is the highest priority. However, finding the time to progress on them is one of their most significant challenges.

Forrester’s recent Security and Risk Forum tailored its agenda to what CISOs need the most: guidance on managing global risks while continuing to progress on enterprise security initiatives, including zero trust.

The keynote, Securing the Future: Geopolitical Risk Will Redefine Security Strategies for the Next Decade, provided practical, prescriptive guidance to CISOs, security and risk management professionals on how they could achieve their highest priority goal. For example, speaking about zero trust, Allie Mellen, a senior analyst at Forrester, advised security leaders to “focus on the low-hanging fruit early on privileged accounts, device hygiene, enforcing strong passwords and in the longer term, leverage a zero-trust strategy to protect devices, protect users, protect networks.”

Continue reading: VentureBeat

Recovery Experts.png
Data Fallout.png
Disaster Recovery Plan.png
Hair Loss.png
Patrick Melampy
Cloud On-Ramp and Protecting Performance The expansion of remote work and the massive growth in usage of cloud-based applications have stressed existing infrastructure and put a keen focus on the performance of everyone’s network environment ...
Gary Bernstein
Benefits of Using an Enterprise Service Microsoft 365 Business connects employees with the people, information, and content they need to get the most out of any device. In business, we talk a lot about efficiency, ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Gilad David Maayan
What Is SSPM? SaaS Security Posture Management (SSPM) is a set of security tools that an organization’s security team can use to gain visibility and manage security for their Software as a Service (SaaS) applications ...
Mitigation Security
Data scraping solutions When people hear the term data scraping, their first thought is often about how companies use this technology for competitive reasons – specifically to pull publicly-available data from millions of websites in ...