Protect Your Brand Today Through Comprehensive Risk Intelligence

Nick Hayes

We all know that securing your perimeter and your internal assets only gets you so far today. The crux of the issue is that your brand, and potential threats to it, are now often external and out of your direct area of control. The number of places and channels online where your brand appears and where malicious actors discuss how to take down your organization is expanding rapidly today.

Websites, media outlets, search engines, marketplaces, social networks, forums, mobile apps, online ads, and more – these are all places where your brands, products, workers, and affiliates and other associated third parties can be mentioned in inappropriate or malevolent contexts: They increase opportunities for brand defamation and data leakage; they act as discreet places to conspire or collude; they open the door to new security vulnerabilities; they decrease your control over your products; and they make it harder to spot contract violations and breaches.

 

The good news is: You’re not powerless either.

Read more

How Technology Burns Out Employees And Erodes Customer Service, And What To Do About It

David Johnson

Do you start your days looking at a calendar full of meetings and feel overcome with joy? Me neither - especially when I have a lot of work to get done that I know is more important. And when you’re in those meetings, are you fully engaged or are you trying to clean out your email queue and put the finishing touches on your slides for your next meeting? That’s what I thought. After all of your meetings, are you in any mood to plan your next day, week or month? Nope, me neither. Do you tell yourself that you’re going to get up early on a Saturday so you can get things done that require a lot of focus, and then don’t do it? Yeah, me too.

And so it continues. A crisis of attention wears us out and re-tunes our brains to feast on the false sense of accomplishment that goes with getting a lot of really small, transactional things done. And our mobile devices make matters worse. Without realizing it, we drain our limited cognitive fuel, leaving nothing left at the end of the day to do serious thinking, creative work or longer-term planning. Mismanaging our technology and ourselves, and burning out, is but one element in a mosaic of things that scientists who participated in our research like Teresa Amabile at the Harvard Business School and author of “The Progress Principle", and David Rock, neuroscientist and author of “Your Brain at Work" now know about how we work best as knowledge workers. It’s also something that we as individuals can, and must control if we want to be effective in our jobs as knowledge workers.

When employees don’t have the resources to meet the demands of their jobs, they burn out

Read more

IBM’s Cloud Platform Strategy Is Getting Legitimate

James Staten

After a slow and somewhat disjointed start, it looks like IBM is starting to build some serious momentum in the Public Cloud Platform game. 

Read more

got STIX?

Rick Holland
The sharing of threat intelligence is a hot topic these days. When I do conference speeches, I typically ask how many organizations see value in sharing, and most in the room will raise their hand.  Next, I ask how many organizations are actually sharing threat intelligence, and roughly 25% to 30% in the room raises their hand. When our 2014 Security Survey data comes in, I will have some empirical data to quote, but anecdotally, there seems to be more interest than action when it comes to sharing. I wrote about some of the challenges around sharing in “Four Best Practices To Maximize The Value Of Using And Sharing Threat Intelligence.” Trust is at the epicenter of sharing and just like in "Meet the Parents," you have to be in the circle of trust. You can enable sharing, but automating trust does take time. 
 
 
Read more

How to Find the Right Provider to Complete Your ITSM Project

Amy DeMartine

A common inquiry I get from clients has some of the following flavors:

  • “We’ve chosen a new ITSM tool and need help moving to it.  Who can help us?”
  • “We want to choose a new ITSM product and an implementation provider at the same time.  How do I know which implementation providers work with a particular ITSM product?”
  • “We don’t have the resources to automate our processes.  Who can help us with that by applying best practices?”
  • “We want to work with someone who has developed industry specific best practices.  Who really delivers that?”
  • “We need to revolutionize the way we are delivering services so we can focus on what really matters to the company.  Is there an implementation service provider who can help get us there from where we are today?”
Read more

A Vendor Arms Race To Fuel Contextual Mobile Apps

Michael Yamnitsky
Vendors across the board are building tools to add context-driven personalization features to mobile apps. Specifically, we see new offerings from vendors in personalization, mobile analytics, API management, predictive analytics, artificial intelligence, and the digital agencies for product and content recommendations, in-app messages, and voice-driven digital assistance
 
Marketers and developers are jumping at these solutions because creating more personalized digital experiences will be critical to remaining competitive. And as CIOs rationalize a larger software platform strategy, these solutions will plug specific mobile engagement gaps along the way. 
 
Want to hear more? In our new brief, Vendors Scramble To Enable Contextual Mobile Moments, we examine how different groups of vendors extend their capabilities to compete in the arms race to deliver contextual mobile apps and provide guidance for CIOs on managing the myriad solutions entering their organization.

Three Ways Mobile Apps Are Better With Contextual Sensor Data

Mike Gualtieri

Watch Forrester Researcher Rowan Curran explain how sensors in mobile devices and remote sensors can uniquely enable three new tiers app functionality. Also, be sure to download the full report: Use Sensors To Take Apps To The Next Level of Customer Engagement

Are You Down With CIP (Critical Infrastructure Protection)?

Rick Holland

I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”  

Critical infrastructure is frequently on my mind, especially the ICS/SCADA within the energy sector. I live in Texas; oil and natural gas are big here ya'll. I'm just a short distance away from multiple natural gas drilling sites.  I cannot help but think about the risks during the extraction and transport of this natural gas.  North Texas has seen an attempt to bomb the natural gas infrastructure. In 2012, Anson Chi attempted to destroy an Atmos Energy pipeline in Plano, Texas. As a security and risk professional, I wonder about the potential cyber impacts an adversary with Chi's motivations could have.

Read more

Telcos Badly Need Shock Therapy -- But Politicians And Regulators Are Unlikely To Support This Treatment

Dan Bieler

The other day, I met with the strategy director of a European telco. Let’s call him Art. We shared an informal discussion about the future of telcos. Personally, I am fairly skeptical about the prospects of telcos to recover ground – in particular in Europe.

Consumers are more concerned about the apps they use and the devices that they have than what connectivity they use, as I outline in the report The Future Of Over-The-Top Services. Forrester’s Customer Experience Index, which measures consumer perceptions of telco services, shows telcos near the bottom of all sector readings.

On the business side, data from Forrester’s Business Technographics® Global Networks And Telecommunications Survey, 2014 shows that business users trust systems integrators and independent solution specialists more than telcos with almost all voice and data service, because they feel that telcos don’t understand their specific business requirements as well.

Add an unfavorable regulatory environment — which, under the umbrella of the net neutrality debate, is about to close the door on commercial relationships regarding quality connectivity between content and network providers — and it becomes difficult to be wildly optimistic about the future of telcos. Yet, this is not where our discussion ended. Art pointed to three major issues where telcos will need shock therapy:

Read more

European Tech Market Showing Signs Of Life, But Not Yet A Boom

Andrew Bartels
Forrester has just published its annual European Tech Market Outlook (see "At Last, A Tech Market Recovery In Europe"), and we are projecting modest growth of 2.3% in euros in 2014 for European business and government purchases of technology goods and services, with an acceleration to 4.9% in 2015.  There are some bright spots in the European tech market:

  • Spending on technology that supports customer facing processes (e.g,, customer relationship management, marketing automation, mobile applications, eCommerce solutions, Web content management, etc.) will rise by over 10% as firms put priorities on technologies that help them directly win, serve, and retain more empowered customers;
Read more