CISO Trends
The chief information security officer (CISO) role is growing in importance and remit. Discover the latest trends and analysis for CISOs and information security leaders.
Insights
Blog
Overregulation Forges A CISO Coalition With The G7 Letter
A coalition of over 40 chief information security officers (CISOs) from leading companies, including Salesforce, Microsoft, AWS, Mastercard, and Siemens, sent a letter to the G7 and OECD, urging them to take action on aligning international cybersecurity regulations. This move signals a strategic shift: CISOs are no longer only responsible for internal controls but are […]
Blog
The Tech Exec’s Guide To Decoding Cybersecurity Vendor Performance
Forrester analyzed the earnings calls of the 10 largest cybersecurity vendors by market cap and identified key trends for technology executives.
Turn Uncertainty Into Opportunity
Market volatility isn’t a roadblock — it’s your launchpad. With Forrester’s expert resources, you can optimize costs, lead with confidence, and turn challenges into growth.
Blog
XR Steps Back, AI Steps Up: The Shake-Up In Our 2025 Emerging Technologies
Forrester’s 2025 top 10 emerging technologies report reveals a major shift in the tech landscape, driven by AI acceleration and changing market dynamics. Longtime list members extended reality and Zero Trust edge are stepping back, making room for two fast-moving innovations — one of which was virtually unknown just a year ago. The earlier release gives tech leaders more time to strategize and align with upcoming breakthroughs in AI and beyond.
Blog
How CISOs Can Thrive Amid Economic Volatility
In today’s unpredictable economic climate, CISOs face familiar — but intensified — challenges. Get some actionable insights to help navigate through turbulent times in this preview of a new report.
Blog
So There Won’t Be A Wiz IPO — What Does That Mean For Cyber IPOs In 2025?
Last week’s mega deal of Google acquiring CNAPP provider Wiz for $32 billion has some lamenting the future of IPOs in the cybersecurity space.
Webinar
Unveiling The Top 10 Emerging Technologies Of 2025
Get an early look at the top 10 emerging technologies for 2025, hear common use cases for each, and learn how (and when) these advancements will produce real benefits.
Blog
Breaches And Lawsuits And Fines, Oh My! What We Learned, The Hard Way, From 2024
With the average cost of a data breach at $2.7 million and 33% of enterprises reporting being breached three or more times over the past 12 months, understanding and learning from past incidents is not just beneficial — it’s essential.
Turn Uncertainty Into Opportunity
Market volatility isn’t a roadblock — it’s your launchpad. With Forrester’s expert resources, you can optimize costs, lead with confidence, and turn challenges into growth.
Blog
Google To Acquire CNAPP Specialist Unicorn Wiz For $32 Billion
Learn what the largest-ever acquisition in cybersecurity means both for Google and the CNAPP space.
Blog
The Akira IoT Device Attacks Aren’t Just About THAT Device
Securing IoT devices presents unique challenges due to their proprietary operating systems and firmware, which often preclude traditional endpoint protection methods. This blog explores the critical role of network segmentation and Zero Trust principles in mitigating risks, emphasizing the importance of robust edge, network, and gateway security measures to defend against sophisticated attacks such as the Androxgh0st botnet and Akira ransomware.
Blog
Top Recommendations For CISOs In 2025: Deal With Uncertainty … Again
The security landscape continues to evolve, as does global uncertainty, leaving CISOs preparing for turbulence ahead.
Blog
The Brewing Battle For Digital Online Age Verification
With online identity verification well understood and maturing, the next brewing verification battle is around age verification, a subset of identity verification.
Blog
Quantum Security Isn’t Hype — Every Security Leader Needs It
The commercial availability of quantum computers that can compromise traditional asymmetric cryptography is still five to 10 years away. But security and risk (S&R) professionals must assess and prepare for the impact of quantum security now.
Showcase Your Security & Risk Innovation With A Forrester Award
Get recognized for excellence in security, privacy, and risk innovation. Apply for a Forrester Security & Risk Enterprise Leadership Award to celebrate your success in creating resilient operations. Apply by July 23, 2025.
Blog
It’s Time To Define Your Professional Existence And Articulate Your Story
The urgency of telling your story as a data or technology leader within the current corporate landscape cannot be overstated. As we navigate these turbulent times, the ability to articulate your professional identity clearly and compellingly has emerged as a critical lifeline. Let this be the moment you choose to define your existence within your organization and beyond.
Blog
Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes
MITRE released its latest Enterprise MITRE ATT&CK Evaluations in December of 2024. At that time, we published a blog with a quick overview of the results. Today, we’re excited to announce that we have released three new pieces of research about this round of evaluations.
Blog
Assessment Is Anyone’s Guess: Proving GOAT Status Requires Validation
As spectators tuned in to Super Bowl LIX to indulge in American culture rife with consumerism, T. Swift, and rap feuds, the buzz was less around the game and more on determining who is pro football’s GOAT (greatest of all time).
Blog
Choose Your Own MDR Adventure: Avoid The Free-For-All Of “New” MDR Services
Managed detection and response (MDR) — without a doubt — has successfully claimed the crown of all managed security services for making and keeping clients happy.
Blog
AI And ML Security: Preventing Jailbreaks, Drop Tables, And Data Poisoning
Get a simplified view of the the top three generative AI use cases that security leaders need to worry about and get recommendations for prioritizing them.
Blog
Tenable To Acquire Vulcan Cyber: More Consolidation In The Vulnerability Management Market
The proactive security market is consolidating further as exposure management vendor Tenable announced its intent to acquire Vulcan Cyber, a unified vulnerability management (UVM) vendor that specializes in third-party vulnerability collection, vulnerability response, and application security posture management. This acquisition demonstrates how vendors are reacting to CISOs’ continued need to unify and consolidate their fragmented […]
Blog
Breaking Down Human-Element Breaches To Improve Cybersecurity: FAQ
We are thrilled to announce our new research report, Deconstructing Human-Element Breaches, detailing the many and varied risks posed by and to humans — a problem that has plagued cybersecurity teams for decades. Forrester clients can use this research as a catalyst for productive conversations with executives and peers across functions about controls to mitigate the human-element breach types most common to their organizations and industries.
Blog
NetApp Focuses On Storage And Exits FinOps
Last week, Flexera announced intent to acquire Spot by NetApp to the tune of $100 million, a considerable drop from the $450 million that NetApp paid to acquire Spot.
More posts