john_kindervag

Author Insights

Blog

Deliver Brand Relevance And Growth With A New Experience Architecture

Nick Barber October 28, 2021
How do firms like Target, The Home Depot, and Starbucks deliver top quality CX and EX? With experience architecture (XA). Learn more about XA in this blog and at our upcoming Technology & Innovation event.
Read More
Blog

CRM And DX Programs Are Set To Collide — Here’s What You Should Do About It

Kate Leggett September 15, 2021
When it comes to your customer engagement strategy, digital experience (DX) and customer relationship management (CRM) teams are often viewed as different breeds with different priorities. DX initiatives have an outside-in view in supporting a customer’s digital journey. DX technologies include marketing, commerce, and content management technologies that are purchased by the CMO, CDO, or […]
Read More
Blog

Predictions 2021: “COVID Wrote The Business Case — Our Future Is Digital”

Ted Schadler October 29, 2020
In 2020, digital shifted from nice-to-have to must-have. In 2021, companies will accelerate their digital transformation with a focus on customers and what, where, and how to serve them.
Read More
Blog

Help Your Employees Adapt To The Post-Pandemic “Adjusted Normal”

James L. McQuivey, PhD June 12, 2020
We’ve pulled together a collection of Forrester's research that will aid our clients in supporting their employees in this “adjusted normal” and maintain employee engagement.
Read More
Blog

If Dr. Seuss Could Comment Upon IoT, This Is What He Might Say…

john_kindervag April 8, 2014
Things Run Amok by John Kindervag (To be read in the style of Dr. Seuss) We live in a world all interconnected But how in the world will it get all protected? Some bad boys and girls will try to infect it Making the internet all broken-neck-ed   When Timmy B-Lee created the net He […]
Read More
Blog

InfoSec, Structural Engineering, And The Security Architecture Playbook

john_kindervag November 21, 2012
Last year the country of Japan suffered a devastating disaster of unspeakable proportions. A massive earthquake on the eastern coast of the country triggered a deadly tsunami that caused the flooding of the Fukushima nuclear power plant. Three dominos fell at once, resulting in a significant and tragic loss of life and property. I visited […]
Read More
Blog

How To Survive And Thrive At #SXSW If You’re Not From Texas

john_kindervag March 9, 2012
I’ll be in Austin, TX this weekend to participate in South-by-Southwest Interactive. My panel “Big Data Smackdown on Cybersecurity” will be held Sunday, March 11 from 12:30PM – 1:30PM at the Austin Hilton Downtown. Hope to see you there. Now, I wasn’t born in Texas, but I got here as soon as I could. I’ve […]
Read More
Blog

Lies, Damn Lies, Security Metrics, And Baseball

john_kindervag March 6, 2012
The legendary British Prime Minister Benjamin Disraeli is said to have noted that “There are lies, damn lies, and statistics.” Much of the technology world is focused on statistics and metrics. You’ve often heard it said, “If I can’t measure it, it doesn’t exist.” Known as the McNamara fallacy — named after the business tycoon […]
Read More
Blog

WikiLeaks And Stratfor Make The Case For More Data Encryption

john_kindervag February 28, 2012
Yesterday, WikiLeaks released emails taken in the highly-publicized Stratfor data breach. While many of the emails are innocuous, such as accusations regarding a stolen lunch from the company refrigerator; others are potentially highly embarrassing to both Stratfor and their corporate clients. The emails reveal some messy corporate spycraft that is usually seen in the movies […]
Read More
Blog

Your Vertical Is . . .

john_kindervag May 9, 2011
Companies often demand to know what their peers in a particular vertical market are doing within the realm of information security before making new decisions. “We’re in retail” or “healthcare” or “financial services” they will say, “and we want to do what everyone else in our industry is doing.” Why? The TCP/IP revolution has changed […]
Read More
Blog

RSA’s Acquisition Of NetWitness Validates Forrester’s NAV Concept

john_kindervag April 4, 2011
Today EMC’s security division RSA announced the acquisition of NAV (Network Analysis and Visibility) vendor NetWitness. Some pundits have suggested that this is a direct result of the recent breach of RSA, but Forrester has been aware that this acquisition was in the works long before the breach was known. In fact, the public announcement of the acquisition was […]
Read More
Blog

Go Long On Glue Manufacturers

john_kindervag August 25, 2010
FLASH TRAFFIC: This just in! The Washington Post is reporting a new wrinkle in cyberwarfare. In the article Defense official discloses cyberattack, the Post reports that “malicious code placed on the [flash] drive by a foreign intelligence agency uploaded itself onto a network run by the U.S. military's Central Command.” Perhaps SkyNet has become self-aware, as […]
Read More
Blog

Preview Of PCI DSS 1.3 – Oops 2.0 – Released

john_kindervag August 13, 2010
The PCI Security Standards Council released the summary of changes for the new version of PCI — 2.0.  Merchants, you can quit holding your breath as this document is a yawner — as we’ve long suspected it would be.  In fact, to call it 2.0 is a real stretch as it seems to be filled — as promised […]
Read More
Blog

Dialoging About Tokenization And Transaction Encryption

john_kindervag April 22, 2010
Last week I published two research reports on the hottest topic in PCI: Tokenization and Transaction Encryption. Part 1 was an introduction into the topic and Part 2 provided some action items for companies to consider during their evolution of these technologies. Respected security blogger, Martin McKeay, commented on Part 1. Serendipitously, Martin was also in Dallas (where […]
Read More
Blog

Stop the Madness! Payment Apps are on the iPad too soon.

john_kindervag April 7, 2010
Even though the iPad is barely birthed, there is already a push to provide payment applications for the device. It's time to pull the emergency brake on this trend. Are these applications PA-DSS certified? Do they have swipe devices with crypto hardware built-in? Has the Pin Entry Device been rigorously tested and meet all the PIN […]
Read More
Blog

Don’t Sign Here Please

john_kindervag February 10, 2010
Visa just announced the expansion of their No Signature program. Citing its "popularity", Visa notes that: "According to a Visa Inc. survey, 69 percent of participants surveyed cited either convenience or speed as the primary reason for using their credit or debit card."  Wow. What this seems to signal is that Visa, and perhaps the […]
Read More
Blog

Trends in Mobile Payments Are Frightening

john_kindervag February 8, 2010
Question: Do I really want someone with an iPhone taking my credit card info? Enormous buzz lately about all of the new players trying to turn iPhones and other mobile devices into credit card swipe terminals. Very scary. Just because someone can create a website does not mean they understand payments. So many questions: Does the solution […]
Read More
Blog

Online Shopping Sites May Be Sharing Your Credit Card Data

john_kindervag February 5, 2010
The Attorney General of New York is investigating a large group of online retailers to see if they have been sharing your credit card data with third parties without your knowledge or permission. In a press release, the AG's Office details the scheme, including the fact that you may unknowingly be giving someone other than the […]
Read More
Blog

MiFi Pwned!

john_kindervag February 3, 2010
Wireless hacking Guru, Josh Wright,has just announced that he has created havoc with a MiFi personal access point.MiFi is a little device that turns 3G wireless signals into WiFi.  The cool thing is that the wireless signal can be shared with other nearby computers.  According to Josh, he has found a way that, "An attacker […]
Read More
Blog

Is 3-D Secure Insecure?

john_kindervag February 1, 2010
Security Researchers in the UK say that the 3-D Secure (3DS) system for credit card authorization, a protocol that was "developed by Visa to improve the security of Internet payments," has significant security weaknesses. It is used by both of the ginormous card brands, known as "Verified by Visa" and "MasterCard SecureCode." This could be a […]
Read More
More posts