Cloud Security

As both IT vendors and buyers explore the advantages of cloud-based solutions, they must also evaluate and manage cloud security risks. Read more to get the expert guidance required.

Insights

Blog

Wiz Acquires Cloud Detection And Response Specialist Gem Security To Round Out Cloud Security Portfolio

Andras Cser 17 hours ago
Recently, Wiz announced the acquisition of cloud detection and response vendor Gem Security. Learn how this move aligns with Wiz’s plan to build a comprehensive cloud security portfolio and accelerate product innovation.
Blog

Modernize Your Cloud Governance To Match Today’s Cloud Strategy

Tracy Woo 2 days ago
As the cloud landscape adapts to new changes, there is a renewed interest in cloud governance programs. But implementation of cloud governance may prove to be more difficult than expected. Find out why.
Blog

It Ain’t Just AI: What We Saw At Google Cloud Next

Lee Sustar 3 days ago
Google recently held its Google Cloud Next conference four months early to unveil new AI offerings and upstage its rivals. Get a detailed review of all of the announcements at the event in this post.
Blog

Prescription For Change: Cybersecurity Outage Highlights Critical Vulnerabilities In Healthcare

Jeff Pollard February 23, 2024
A recent cybersecurity incident at Change Healthcare cause the pharmacy claims processors to take its systems offline. Learn the implication of this event and five things firms can do to prepare.
Blog

Were Our 2023 Cloud Predictions Correct?

Tracy Woo February 6, 2024
It's time to take a look back and score our 2023 cloud predictions. Find out where we accurately predicted cloud trends and where we missed the mark for cloud in 2023.
Blog

AWS’s Silent Nod To FinOps

Tracy Woo December 12, 2023
Last week, Amazon.com VP and CTO Werner Vogels closed out re:Invent 2023 with his keynote address on the “frugal architect.” This isn’t the first time that Vogels has introduced this topic. In fact, it was a theme he originally introduced in 2012 that revolves around architecting with cost in mind. To me, and likely to […]
Blog

VMware Customers: Brace For Impact

Tracy Woo November 22, 2023
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.

Strenthen Security Operations With Agile SecOps

Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.

Blog

Announcing The Forrester Wave™: Zero Trust Platform Providers, Q3 2023

Carlos Rivera October 19, 2023
Get an inside look at some of the highlights and findings from the new Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report.
Podcast

Zero Trust Past, Present, And Future

What It Means October 12, 2023
Zero Trust has evolved since its earliest iterations, but it’s never been more vital than it is today. In this episode, Principal Analyst David Holmes discusses the origins of Zero Trust and its future impact on driving business value.
Podcast

The Future Of Cloud

What It Means October 5, 2023
Recent, major shifts in the cloud space are prompting some technology leaders to review their cloud strategies. In this episode, Principal Analyst Lee Sustar provides his perspective on the future of cloud and how it may impact your technology roadmap.
Blog

The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?

Jeff Pollard September 28, 2023
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.
Blog

Splunk Is Good For Cisco, But Cisco Needs To Convince Splunk Customers That Cisco Is Good For Them

Allie Mellen September 22, 2023
Find out what Cisco's $28 billion planned acquisition of Splunk could mean for both observability and security.
Blog

Zero Trust For Cloud Workloads? It’s Possible!

Andras Cser September 12, 2023
Curious about Zero Trust in the cloud? Learn more about it in this preview of our upcoming Security & Risk Forum.
Webinar

Enhance Your Security Operations Practice With Agile And Detection Engineering

Get a deep dive on detection engineering in security operations. Hear Forrester advice on best practices and the use of detection–as–code. 
Blog

2003 Called, And It Doesn’t Want Its Email Security Appliances Back

Joseph Blankenship August 24, 2023
Email security appliances have come a long way in the past 20 years. Learn the benefits of cloud-delivered email security.
Blog

Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023

David Levine August 22, 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]
Blog

Black Hat USA 2023: Insights From Our Short Vegas Residency

Jeff Pollard August 21, 2023
Black Hat USA 2023: Insights From Our Short Vegas Residency Black Hat has gone from being RSAC’s smaller tech and practitioner-focused cousin to being a commercial showcase for cybersecurity vendors. A tightly packed, noisy Business Hall included over 300 vendors and 400 organizations with booths, which was great for swag but bad for anyone with […]
Blog

The Big Three Hyperscalers All Have Cloud-Native ZTNA Now

David Holmes August 7, 2023
The big three public cloud providers all now offer cloud-native ZTNA services. Learn more about the ZTNA service offered by each of the hyperscalers in this post.
Blog

Introducing Detection Surface, The Cybersecurity Defense That Parallels Attack Surface

Allie Mellen June 26, 2023
On traditional infrastructure (laptops, servers, workstations, on-premises network infrastructure), the attack surface was the closest match to true perimeter-based defense we could get. The network infrastructure gave access to the systems within (crunchy outside; gooey, cubicle, khakis, and blue button-downs inside). As such, detection of attacker activity was relegated to network-based activity, endpoint-based activity, and […]
Blog

To Secure Kubernetes, Think Beyond Kubernetes

Sandy Carielli June 22, 2023
Kubernetes is the de facto standard for deploying and managing application workloads and containers. Lee has written quite a bit about the power of Kubernetes as an innovation platform, but while development and architecture teams are bullish on Kubernetes, security teams can find themselves scrambling to secure Kubernetes environments as they hurtle toward production. The […]
More posts