Allie Mellen

Principal Analyst

Forrester Bio

Author Insights

Blog

AI Vendor Threat Research And Cybersecurity’s Cynicism Problem

Jeff Pollard 3 hours ago
For years, the security community decried the lack of transparency in public breach disclosure and communication. But when AI vendors break with old norms and publish how attackers exploit their platforms, that same community’s reaction is split. Some are treating this intelligence as a learning opportunity. Others are dismissing it as marketing noise. Unfortunately, some […]
Blog

Microsoft Ignite 2025: Living The Frontier Lifestyle

Chris Gardner 3 days ago
At Microsoft Ignite 2025, Microsoft outlined a vision for the “frontier” organization: one dramatically transformed through AI and AI agents. Learn about some of the major announcements and our analysis here.
Blog

Anthropic Catches Attackers Using Agents In The Act

James Plouffe November 17, 2025
On November 13, AI vendor Anthropic published details about the disruption of what it characterized as an AI-led cyber espionage operation. Learn what is in Anthropic's report and get tips on how to protect against future AI-enabled attacks.
Blog

Gold Rush Or Fool’s Gold? How To Evaluate Security Tools’ Generative AI Claims

Allie Mellen October 27, 2025
Generative AI features and products for security are gaining significant traction in the market. Knowing how to evaluate them, however, remains a mystery. What makes a good AI feature? How do we know if the AI is effective or not? These are just some of the questions I receive on a regular basis from Forrester […]
Blog

Declaring Zero Trust Without Testing Is A Lie

Tope Olufon October 20, 2025
Zero Trust without real-world testing is a false sense of security. Learn how MITRE ATT&CK-driven adversarial trials turn Zero Trust from theory into proof.
Blog

How F5 And SonicWall Revealed The Fragility Of The Software Supply Chain

Carlos Rivera October 17, 2025
The recent breaches at F5 and SonicWall illustrate how attackers are targeting the very infrastructure that enterprises rely on to secure and deliver digital services.
Blog

Your Top Questions On Generative AI, AI Agents, And Agentic Systems For Security Tools Answered

Allie Mellen September 23, 2025
Many security professionals are still confused about which AI capabilities are real now and which will come down the road. Get answers to some of the most common questions about use of generative AI, agentic AI, and AI agents in security tools in this preview of our upcoming Security & Risk Summit.
Blog

Splunk .conf25: Cisco, AI, And Data

Allie Mellen September 15, 2025
The 10th annual Splunk .conf took place in Boston recently. From the opening keynote to various new product releases and enhancements, get a full review of the event in this post.
Blog

Black Hat 2025: Troop Forrester Goes To Hacker Summer Camp

James Plouffe August 13, 2025
2025 marks the 28th year of Black Hat, and although it remains on the edgier side of corporate-focused cybersecurity conferences, it sometimes feels like the event is considering completely ditching its hoodie in favor of a collared shirt.
Blog

Palo Alto Networks Enters The Identity Security Market With $25B Purchase Of CyberArk

Allie Mellen July 31, 2025
The third-largest cybersecurity M&A deal in history makes sense in some respects, but the track record on mega security and identity tie-ups is incomplete and unproven.
Blog

Drowning In Security Data Costs? You Get A Data Lake

Allie Mellen July 22, 2025
A common client request I’ve gotten over the past several years is how to best manage growing data costs in the security information and event management (SIEM) system.
Blog

Understanding The Real Cyber Risks Behind The Iran-Israel-US Geopolitical Tensions

Jitin Shabadu June 27, 2025
When geopolitical bombs drop, cyber fallout often follows. Get five key insights to help you focus on the security strategies that matter most during times of geopolitical escalations.
Blog

AWS re:Inforce 2025 — Heavy On User Experience Enhancements, Light On The GenAI Hype

Allie Mellen June 25, 2025
This year's AWS re:Inforce event included a big announcement and revealed other security-related enhancements. Read our top takeaways.
Blog

Announcing The Forrester Wave™: Security Analytics Platforms, Q2 2025 — The SIEM Vs. XDR Fight Intensifies

Allie Mellen June 24, 2025
Find out how our latest analysis of the security analytics platforms space illustrates the dramatic changes this market is undergoing as legacy SIEM vendors are locked in heated competition with surging XDR providers.
Blog

Datadog DASH: A Revolving Door Of Operations And Security Announcements

Carlos Casanova June 20, 2025
Datadog’s 2025 keynote showcased a bold vision for AI-driven observability and security, unveiling a sweeping array of autonomous agents and tools designed to transform IT operations. From Bits AI SRE and Security Analyst to LLM Observability and Code Security, Datadog is trying to position itself as a central hub for operational intelligence in an increasingly algorithmic tech landscape.
Blog

Zscaler Snatches Up Red Canary: The Good, The Bad, And The Concerning

Jeff Pollard May 28, 2025
Find out what Zscaler's acquisition of Red Canary could mean for the cybersecurity market as a whole as well as for security leaders and their teams.
Blog

Coinbase Flips The Coin On Would-Be Extortionists

Joseph Blankenship May 16, 2025
In a recent example of why managing insider risk is critical, cryptocurrency exchange Coinbase announced that it was the target of an extortion scheme enabled by insiders. Learn more about the incident and how to protect against it in this blog.
Blog

Overregulation Forges A CISO Coalition With The G7 Letter

Madelein van der Hout April 24, 2025
A coalition of over 40 chief information security officers (CISOs) from leading companies, including Salesforce, Microsoft, AWS, Mastercard, and Siemens, sent a letter to the G7 and OECD, urging them to take action on aligning international cybersecurity regulations.
Blog

Don’t Call It A Comeback: Stay Ready For Ransomware

Jess Burn April 22, 2025
So far, 2025 is filled with … distractions for security leaders. Between scrambling to secure their organizations’ AI initiatives, staying on top of critical vulnerabilities (and the organizations delivering the CVE process), perpetually communicating and training to guard against human element breaches, and navigating yet another period of uncertainty and volatility, it’s tempting to take […]
Blog

MITRE-geddon Averted, But Fragility In CVE Processes Remains

Erik Nost April 18, 2025
This week, we saw the CVE process, as we know it, come hours from the brink of collapse when a memo started circulating on LinkedIn that DHS would cut funding to MITRE’s CVE cataloging on April 16. MITRE’s role in the CVE process is the crucial first step in assigning IDs to vulnerabilities so that practitioners, vendors, researchers, and governments across the globe can consistently reference the same vulnerability. The process also allows for responsible disclosures and accountability for vulnerabilities to software companies.
More posts