More HFS Security & Trust Research

Data Viewpoint

The BFSI industry gets proactive with its ransomware defense strategy

The BFSI industry putting threat intelligence and containment at the forefront of its ransomware defense strategy.

Data Viewpoint

You need shared accountability and tailored engagement to foster a cybersecurity culture

Shared accountability and personalized engagement are the two essential ingredients for building a cybersecurity-conscious culture.

Data Viewpoint

End-to-end management of privileged access is too critical to be left to manual processing

Technology leaders must be on guard as end-to-end management of privileged access is too critical to be left to manual processing

Point of View

Move beyond tactical RPA and embrace native automation

Take advantage of emerging technology and services to scale the value of collaboration into every process across every function.

Data Viewpoint

Security teams want more intelligent automation to alleviate the compliance burden

“Death by compliance” is preventing security teams from improving their practices, and intelligent automation can save the day.

Data Viewpoint

Retailers should overcome data governance and security issues to improve the CX

Building/sourcing data management teams will help retailers overcome their data security and governance issues

Data Viewpoint

When the three lines of defense for information security rapidly become two

Security-as-a-Service is moving the responsibility for managing security risks and controls from enterprises to service providers

Point of View

Enterprises must fight the vicious trifecta of ransomware to avoid calamity - Here’s how to do it

Enterprises must develop a holistic ransomware response strategy, balancing technology alongside people and processes.

Point of View

Don’t let cybersecurity hysteria get you down—the HFS manifesto will guide you

Our five core research pillars and CHIEF principles provide differentiated insights to CISOs, IT and business leaders.

Point of View

Make employees your best firewall, not the weakest link in your cybersecurity chain

It is high time for CISOs, IT and business leaders to seriously invest in a more people-centric approach to cyber security.

Point of View

Avoid a robotic misadventure - focus on the security that matters

This POV provide an overview of key security considerations when deploying a Robotic Process Automation environment.

Point of View

Make decentralization your friend; let consumers take control of their health data

Ransomware attacks on healthcare is rampant; regulations and enterprise capabilities are insufficient. So consumers to own data.

Highlight Report

HFS Highlight: Teleperformance’s Cloud Campus prepares to overcome cyber threats in its global model

How Teleperformance's security and data privacy expertise is defending against and preventing cyber attacks

Highlight Report

HFS Highlight: Atos bolsters crucial cybersecurity division with trio of acquisitions

Cybersecurity is more important than ever, and Atos’ recent flurry of M&A activity in the space could be exactly what enterprise need.

Point of View

CISO’s must carefully assess Accenture’s cyber spending spree

With cybersecurity pegged to sit high on C-Level agendas over the next 24 months, providers are working hard to buy in the capability they need to deliver new

Highlight Report

HFS Highlight: Atos scoops up AI-Driven Detection and Response firm Paladion

Atos recently announced intentions to acquire Paladion - helping the firm move into the competitive detection and response market.

Point of View

To secure IT assets, believe nothing and trust no one

Thinking about security in terms of keeping the bad actors out is no longer enough. Assume they can get in and think about how you will stop them when they do.

Point of View

Poorly configured cloud: IT experts must plug vulnerabilities

In this report, we examine how configuration errors are at the root of many of the major cyber breaches.

Point of View

Prepare now for a splurge on Industry 4.0 services after COVID-19

Providers must prepare their clients, partners, and narratives for an Industry 4.0 rush after COVID-19—while focusing on key short-term technologies

Point of View

Enterprises look to the cloud and cybersecurity to get them through COVID-19—smart providers will prep

Executives are planning to spend big on cloud to get them the accessibility they need in a widespread remote environment

Point of View

Accenture has added an arrow to its quiver with its Revolutionary Security acquisition; CISOs must take

COVID-19 means that now more than ever, it is important to invest in security as demand increases to support the growing number of work-from-home employees and

Point of View

Make security spending a priority during COVID-19: Enlist security service providers to secure your area

COVID-19 has caused chaos for enterprises, creating unprecedented challenges with the increase in employees working from home. These challenges have raised and

Point of View

The CISO talent crisis: Enterprise leaders must nurture and protect their CISOs, or they might find with

The stress levels of CISOs are rising, with 90% advising they are moderately or tremendously affected. Enterprise leaders must act: improve working conditions,

Point of View

Security service providers need to target the overstretched security of state and local than 40% of US to

With this wave of ransomware hitting local government organizations hard, security service providers should be looking to step forward to plug the evident gaps

Point of View

Telco leaders must comply with new UK 5G rules and ensure their partner eco-system isn’t over-reliant

5G is well on the way to global deployment—but the Huawei question remains. Previous HFS work has outlined the advantages and disadvantages of 5G and the of

Point of View

CISOs, take note: Accenture aims to boost the contents of its cyber toolbox with Symantec’s Cyber

Unless you have been living in a cave, it will have become clear that Accenture has been leading CISOs on a feeding frenzy through its multiple security

Point of View

The arms race against cybercriminals is in full swing, and Unisys Stealth in combination with Dell EMC a

You might think that Unisys was an out-of-date, irrelevant dinosaur with nothing new to offer—but think again! This solution is innovative and leading-edge, a

Point of View

Cyber ranges: Pick a provider to wargame your cybersecurity—it’s unlikely that doing it in-house is

Do you have the expertise and systems to assess your own cybersecurity? Can you afford to miss out on the wider benefits of providers’ cyber ranges?

Point of View

Industrial IoT cybersecurity rests on integrating digitally native and legacy devices (and people)

As the Industrial IoT expands, cybersecurity's importance must be translated across IT and OT departments, and new and legacy devices.

Point of View

State-sponsored hacking is on the rise according to the former head of MI6—CISOs must act

The increasing frequency of state-sponsored cyberthreats is a worrying prospect. The era of cyberwarfare has begun, and enterprises and industry are credible As

Point of View

Cybersecurity is everyone’s problem: Leaders, build up your ecosystems and cover all bases.

Security leaders must bridge the gap between policy, academia, vendors, service providers, and society... and do it quickly.

Point of View

Accenture’s cybersecurity acquisitions add capability in the US and boots on the ground Down take now!

As we well know, Accenture is not afraid to make a few acquisitions to bolster its armory and it has once again demonstrated this buying power with the of BCT

Point of View

Sharpen your swords and fill your disruptor-sized cybersecurity gaps today!

As the number and variety of cybersecurity challenges continue grow for the modern enterprise, so does the understanding that security is a top priority, of

Point of View

Patient Data is valuable and vulnerable - the healthcare industry must prepare or risk catastrophic

Gone are the days of wearing wristwatches to actually tell the time. Smart connected devices have made a huge public impact, becoming widely accepted as a part

Point of View

Industry leaders must look to modern innovators for their cybersecurity defense or risk embarrassing from

Industry leaders must look to secure their enterprises from multiple cyber threats on a constant basis. Remote workers are an easy target for cybercriminals

Point of View

Enterprise leaders have been funding cybercriminals for years, now stop!

With ransomware’s lethality continuing to grow, industry leaders must look to themselves as part of the problem.

Point of View

Google’s taking cloud security seriously but is that going to be enough for enterprises?

As CIOs migrate more business data to the cloud, securing it will take up a much larger portion of corporate mindshare. To assure executives of their cloud’s

Point of View

Cyber threat is a big grizzly bear—don’t be the enterprise that can’t outrun it!

In this POV we outline the barriers to the CISO and the executive board working together and provide recommendations to both parties to improve the situation.

Point of View

Security officers must acknowledge 5G’s cybersecurity risks

With 5G on the horizon, security officers and enterprise leaders must embrace the technology while acknowledging the risk with their eyes wide open.

Point of View

Security leaders must combat the enemy within

This POV highlights the importance of monitoring internal security threats as they are more prolific than external threats within the enterprise.

Point of View

Executives and Security Officers, let’s get physical about security!

Physical security is a key concern for any organisation, but are you spending enough to secure yourself? HFS data has revealed that many organisations physical

Point of View

Security Leaders: You Must Share Corporate Mindshare Across the Virtual and the Physical, or Risk

Enterprise leaders and the growing population of chief information security officers must act now to ensure their cybersecurity policy stretches to physical are

Point of View

The Brexit Cybersecurity Talent Crisis: Enterprise leaders must act now or leave themselves exposed to a

After a sobering review, it’s clear that security leaders must put the groundwork in now if they want to weather the impending Brexit talent crisis.

Point of View

Palo Alto clients must pay attention to the Demisto acquisition to combat security threats

The cybersecurity space is a complex yet predictable headline generator for mainstream media. Enterprises are pushing their cybersecurity harder than ever to as

Point of View

Enterprises must focus equally on physical and cyber security threats, or else risk embarrassing security

Enterprises must focus equally on physical and cyber security threats, or else risk embarrassing information security blunders.

Point of View

Why Enterprises Are Leaving Themselves Open to Significant Risk

Are enterprises ready for almost-inevitable internal and external security breaches? This report combines information from 300 IT professionals about the facing

Point of View

Don’t Let Security Concerns Hold Back Your Cloud Migration Journey

Enterprises are showing increased appetite for the cloud, but some are still holding back due to security concerns. This report examines why.

Point of View

Cyber Security Services: What's in Store for 2018?

A number of the main predictions of drivers for investment in cyber security services in 2018.

Point of View

The Thirteen Smart Technologies Shaping Industry 4.0

This PoV discusses thirteen smart technologies shaping Industry 4.0 based on a study of 500+ engagements across 12 service providers.

Point of View

Is HR the Missing Link in Your Cyber Security Strategy?

Having the available talent and company wide attitude towards security is essential in preventing breaches.

Point of View

The State of Cybersecurity and Digital Trust 2016

Our annual deep-dive report on the cyber threats faced by enterprises and the gaps they must overcome to build both brand and digital trust.

Point of View

CyberSecurity and the Personnel Touch

The theft of over 5 million fingerprints from the Office of Personnel Management highlights the case for a hands-on approach to integrating physical and logical

Point of View

The Long Tail of Ashley Madison

30 million exposed users are just the beginning of a nasty Ashley Madison saga touching on the very nature of cybersecurity, the risk of corporate and the value