CISO Trends

The chief information security officer (CISO) role is growing in importance and remit. Discover the latest trends and analysis for CISOs and information security leaders.

Insights

Blog

Overregulation Forges A CISO Coalition With The G7 Letter

Madelein van der Hout 1 day ago
A coalition of over 40 chief information security officers (CISOs) from leading companies, including Salesforce, Microsoft, AWS, Mastercard, and Siemens, sent a letter to the G7 and OECD, urging them to take action on aligning international cybersecurity regulations. This move signals a strategic shift: CISOs are no longer only responsible for internal controls but are […]
Blog

The Tech Exec’s Guide To Decoding Cybersecurity Vendor Performance

Madelein van der Hout April 15, 2025
Forrester analyzed the earnings calls of the 10 largest cybersecurity vendors by market cap and identified key trends for technology executives.

Turn Uncertainty Into Opportunity

Market volatility isn’t a roadblock — it’s your launchpad. With Forrester’s expert resources, you can optimize costs, lead with confidence, and turn challenges into growth.

Blog

XR Steps Back, AI Steps Up: The Shake-Up In Our 2025 Emerging Technologies

Brian Hopkins April 14, 2025
Forrester’s 2025 top 10 emerging technologies report reveals a major shift in the tech landscape, driven by AI acceleration and changing market dynamics. Longtime list members extended reality and Zero Trust edge are stepping back, making room for two fast-moving innovations — one of which was virtually unknown just a year ago. The earlier release gives tech leaders more time to strategize and align with upcoming breakthroughs in AI and beyond.
Blog

How CISOs Can Thrive Amid Economic Volatility

Jeff Pollard April 4, 2025
In today’s unpredictable economic climate, CISOs face familiar — but intensified — challenges. Get some actionable insights to help navigate through turbulent times in this preview of a new report.
Blog

So There Won’t Be A Wiz IPO — What Does That Mean For Cyber IPOs In 2025?

Merritt Maxim April 3, 2025
Last week’s mega deal of Google acquiring CNAPP provider Wiz for $32 billion has some lamenting the future of IPOs in the cybersecurity space.
Webinar

Unveiling The Top 10 Emerging Technologies Of 2025

Get an early look at the top 10 emerging technologies for 2025, hear common use cases for each, and learn how (and when) these advancements will produce real benefits.
Blog

Breaches And Lawsuits And Fines, Oh My! What We Learned, The Hard Way, From 2024

Janet Worthington March 25, 2025
With the average cost of a data breach at $2.7 million and 33% of enterprises reporting being breached three or more times over the past 12 months, understanding and learning from past incidents is not just beneficial — it’s essential.

Turn Uncertainty Into Opportunity

Market volatility isn’t a roadblock — it’s your launchpad. With Forrester’s expert resources, you can optimize costs, lead with confidence, and turn challenges into growth.

Blog

Google To Acquire CNAPP Specialist Unicorn Wiz For $32 Billion

Andras Cser March 19, 2025
Learn what the largest-ever acquisition in cybersecurity means both for Google and the CNAPP space.
Blog

The Akira IoT Device Attacks Aren’t Just About THAT Device

Paddy Harrington March 12, 2025
Securing IoT devices presents unique challenges due to their proprietary operating systems and firmware, which often preclude traditional endpoint protection methods. This blog explores the critical role of network segmentation and Zero Trust principles in mitigating risks, emphasizing the importance of robust edge, network, and gateway security measures to defend against sophisticated attacks such as the Androxgh0st botnet and Akira ransomware.
Blog

Top Recommendations For CISOs In 2025: Deal With Uncertainty … Again

Jeff Pollard March 12, 2025
The security landscape continues to evolve, as does global uncertainty, leaving CISOs preparing for turbulence ahead.
Blog

The Brewing Battle For Digital Online Age Verification

Merritt Maxim March 11, 2025
With online identity verification well understood and maturing, the next brewing verification battle is around age verification, a subset of identity verification.
Blog

Quantum Security Isn’t Hype — Every Security Leader Needs It

Merritt Maxim March 3, 2025
The commercial availability of quantum computers that can compromise traditional asymmetric cryptography is still five to 10 years away. But security and risk (S&R) professionals must assess and prepare for the impact of quantum security now.

Showcase Your Security & Risk Innovation With A Forrester Award

Get recognized for excellence in security, privacy, and risk innovation. Apply for a Forrester Security & Risk Enterprise Leadership Award to celebrate your success in creating resilient operations. Apply by July 23, 2025.

Blog

It’s Time To Define Your Professional Existence And Articulate Your Story

Kim Herrington February 27, 2025
The urgency of telling your story as a data or technology leader within the current corporate landscape cannot be overstated. As we navigate these turbulent times, the ability to articulate your professional identity clearly and compellingly has emerged as a critical lifeline. Let this be the moment you choose to define your existence within your organization and beyond.
Blog

Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes

Allie Mellen February 12, 2025
MITRE released its latest Enterprise MITRE ATT&CK Evaluations in December of 2024. At that time, we published a blog with a quick overview of the results. Today, we’re excited to announce that we have released three new pieces of research about this round of evaluations.
Blog

Assessment Is Anyone’s Guess: Proving GOAT Status Requires Validation

Erik Nost February 11, 2025
As spectators tuned in to Super Bowl LIX to indulge in American culture rife with consumerism, T. Swift, and rap feuds, the buzz was less around the game and more on determining who is pro football’s GOAT (greatest of all time).
Blog

Choose Your Own MDR Adventure: Avoid The Free-For-All Of “New” MDR Services

Jeff Pollard February 4, 2025
Managed detection and response (MDR) — without a doubt — has successfully claimed the crown of all managed security services for making and keeping clients happy.
Blog

AI And ML Security: Preventing Jailbreaks, Drop Tables, And Data Poisoning

Jeff Pollard January 30, 2025
Get a simplified view of the the top three generative AI use cases that security leaders need to worry about and get recommendations for prioritizing them.
Blog

Tenable To Acquire Vulcan Cyber: More Consolidation In The Vulnerability Management Market

Erik Nost January 30, 2025
The proactive security market is consolidating further as exposure management vendor Tenable announced its intent to acquire Vulcan Cyber, a unified vulnerability management (UVM) vendor that specializes in third-party vulnerability collection, vulnerability response, and application security posture management. This acquisition demonstrates how vendors are reacting to CISOs’ continued need to unify and consolidate their fragmented […]
Blog

Breaking Down Human-Element Breaches To Improve Cybersecurity: FAQ

Jinan Budge January 28, 2025
We are thrilled to announce our new research report, Deconstructing Human-Element Breaches, detailing the many and varied risks posed by and to humans — a problem that has plagued cybersecurity teams for decades. Forrester clients can use this research as a catalyst for productive conversations with executives and peers across functions about controls to mitigate the human-element breach types most common to their organizations and industries.
Blog

NetApp Focuses On Storage And Exits FinOps

Tracy Woo January 22, 2025
Last week, Flexera announced intent to acquire Spot by NetApp to the tune of $100 million, a considerable drop from the $450 million that NetApp paid to acquire Spot.
More posts