Cloud Security
As both IT vendors and buyers explore the advantages of cloud-based solutions, they must also evaluate and manage cloud security risks. Read more to get the expert guidance required.
Insights
Blog
Wiz Acquires Cloud Detection And Response Specialist Gem Security To Round Out Cloud Security Portfolio
Recently, Wiz announced the acquisition of cloud detection and response vendor Gem Security. Learn how this move aligns with Wiz’s plan to build a comprehensive cloud security portfolio and accelerate product innovation.
Blog
Modernize Your Cloud Governance To Match Today’s Cloud Strategy
As the cloud landscape adapts to new changes, there is a renewed interest in cloud governance programs. But implementation of cloud governance may prove to be more difficult than expected. Find out why.
Blog
It Ain’t Just AI: What We Saw At Google Cloud Next
Google recently held its Google Cloud Next conference four months early to unveil new AI offerings and upstage its rivals. Get a detailed review of all of the announcements at the event in this post.
Blog
Prescription For Change: Cybersecurity Outage Highlights Critical Vulnerabilities In Healthcare
A recent cybersecurity incident at Change Healthcare cause the pharmacy claims processors to take its systems offline. Learn the implication of this event and five things firms can do to prepare.
Blog
Were Our 2023 Cloud Predictions Correct?
It's time to take a look back and score our 2023 cloud predictions. Find out where we accurately predicted cloud trends and where we missed the mark for cloud in 2023.
Blog
AWS’s Silent Nod To FinOps
Last week, Amazon.com VP and CTO Werner Vogels closed out re:Invent 2023 with his keynote address on the “frugal architect.” This isn’t the first time that Vogels has introduced this topic. In fact, it was a theme he originally introduced in 2012 that revolves around architecting with cost in mind. To me, and likely to […]
Blog
VMware Customers: Brace For Impact
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Strenthen Security Operations With Agile SecOps
Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.
Blog
Announcing The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
Get an inside look at some of the highlights and findings from the new Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report.
Podcast
Zero Trust Past, Present, And Future
Zero Trust has evolved since its earliest iterations, but it’s never been more vital than it is today. In this episode, Principal Analyst David Holmes discusses the origins of Zero Trust and its future impact on driving business value.
Podcast
The Future Of Cloud
Recent, major shifts in the cloud space are prompting some technology leaders to review their cloud strategies. In this episode, Principal Analyst Lee Sustar provides his perspective on the future of cloud and how it may impact your technology roadmap.
Blog
The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.
Blog
Splunk Is Good For Cisco, But Cisco Needs To Convince Splunk Customers That Cisco Is Good For Them
Find out what Cisco's $28 billion planned acquisition of Splunk could mean for both observability and security.
Blog
Zero Trust For Cloud Workloads? It’s Possible!
Curious about Zero Trust in the cloud? Learn more about it in this preview of our upcoming Security & Risk Forum.
Webinar
Enhance Your Security Operations Practice With Agile And Detection Engineering
Get a deep dive on detection engineering in security operations. Hear Forrester advice on best practices and the use of detection–as–code.
Blog
2003 Called, And It Doesn’t Want Its Email Security Appliances Back
Email security appliances have come a long way in the past 20 years. Learn the benefits of cloud-delivered email security.
Blog
Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]
Blog
Black Hat USA 2023: Insights From Our Short Vegas Residency
Black Hat USA 2023: Insights From Our Short Vegas Residency Black Hat has gone from being RSAC’s smaller tech and practitioner-focused cousin to being a commercial showcase for cybersecurity vendors. A tightly packed, noisy Business Hall included over 300 vendors and 400 organizations with booths, which was great for swag but bad for anyone with […]
Blog
The Big Three Hyperscalers All Have Cloud-Native ZTNA Now
The big three public cloud providers all now offer cloud-native ZTNA services. Learn more about the ZTNA service offered by each of the hyperscalers in this post.
Blog
Introducing Detection Surface, The Cybersecurity Defense That Parallels Attack Surface
On traditional infrastructure (laptops, servers, workstations, on-premises network infrastructure), the attack surface was the closest match to true perimeter-based defense we could get. The network infrastructure gave access to the systems within (crunchy outside; gooey, cubicle, khakis, and blue button-downs inside). As such, detection of attacker activity was relegated to network-based activity, endpoint-based activity, and […]
Blog
To Secure Kubernetes, Think Beyond Kubernetes
Kubernetes is the de facto standard for deploying and managing application workloads and containers. Lee has written quite a bit about the power of Kubernetes as an innovation platform, but while development and architecture teams are bullish on Kubernetes, security teams can find themselves scrambling to secure Kubernetes environments as they hurtle toward production. The […]
More posts