Cybersecurity Trends
Stay up-to-date on the cutting edge of cybersecurity with insights on Zero Trust, vendors, regulations, and other privacy & security topics.
Insights
Blog
Top Recommendations For CISOs In 2025: Deal With Uncertainty … Again
The security landscape continues to evolve, as does global uncertainty, leaving CISOs preparing for turbulence ahead.
Blog
Cybersecurity’s Latest Buzzword Has Arrived: What Agentic AI Is And Isn’t
As vendors come out of the woodwork announcing their “agentic AI” innovations, we explore what the term truly encompasses and what is hype.
Missed It? Watch The APAC Predictions Webinar Replay
Watch it now to explore the 2025 tech predictions impacting APAC tech leaders. Learn what this research means for tech and security strategies in the Asia Pacific region.
Blog
The Brewing Battle For Digital Online Age Verification
With online identity verification well understood and maturing, the next brewing verification battle is around age verification, a subset of identity verification.
Blog
How I Apply Third-Party Lab Results In My Security Operations Research
Last week, I attended the AV-Comparatives conference in Innsbruck, Austria. This conference brought together many cybersecurity vendors, particularly those with a European focus, as well as a few nonprofits, academic institutions, and analyst firms.
Blog
Announcing The Forrester Wave™: Managed Detection And Response Services, Q1 2025!
The third installment of The Forrester Wave™: Managed Detection And Response Services is now live, and there’s so much to love about the managed detection and response (MDR) services market: fantastic providers, engaged clients, and meaningful outcomes. This year is no different. Forrester clients can access the full report here. As we mentioned in Choose […]
Blog
Detect, Defend, Deny: Zero Trust World 2025
Cybersecurity vendor ThreatLocker recently hosted its fifth annual Zero Trust World (ZTW) conference in Orlando, welcoming attendees from 28 countries to learn about Zero Trust principles and ThreatLocker offerings. Over two days, the event celebrated Zero Trust as a cybersecurity model and the ThreatLocker approach for achieving Zero Trust. Industry leaders, managed service providers, security […]
Blog
The UK Government Is Ready To Embrace AI, But Without Trust, It Risks Disaster
A commitment to trustworthy AI is paramount to keep the enthusiasm going and avoid backlash — particularly as safety takes a backseat to security.
Blog
Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes
MITRE released its latest Enterprise MITRE ATT&CK Evaluations in December of 2024. At that time, we published a blog with a quick overview of the results. Today, we’re excited to announce that we have released three new pieces of research about this round of evaluations.
Blog
Deepfakes Are Here: Here’s What To Do
In the last two years, growing concerns around the proliferation of and advances in deepfakes has raised concerns around their potential to impede adoption of facial and voice biometrics.
Blog
Assessment Is Anyone’s Guess: Proving GOAT Status Requires Validation
As spectators tuned in to Super Bowl LIX to indulge in American culture rife with consumerism, T. Swift, and rap feuds, the buzz was less around the game and more on determining who is pro football’s GOAT (greatest of all time).
Blog
Choose Your Own MDR Adventure: Avoid The Free-For-All Of “New” MDR Services
Managed detection and response (MDR) — without a doubt — has successfully claimed the crown of all managed security services for making and keeping clients happy.
Blog
AI And ML Security: Preventing Jailbreaks, Drop Tables, And Data Poisoning
Get a simplified view of the the top three generative AI use cases that security leaders need to worry about and get recommendations for prioritizing them.
Missed Our Tech & Security Predictions Webinar?
Watch the replay to catch up! Dive into the top 2025 predictions and discover their impact on your tech and security strategies — with exclusive insights from the analysts who conducted the research.
Blog
Breaking Down Human-Element Breaches To Improve Cybersecurity: FAQ
We are thrilled to announce our new research report, Deconstructing Human-Element Breaches, detailing the many and varied risks posed by and to humans — a problem that has plagued cybersecurity teams for decades. Forrester clients can use this research as a catalyst for productive conversations with executives and peers across functions about controls to mitigate the human-element breach types most common to their organizations and industries.
Blog
Highlights And Implications Of Biden’s Executive Order On Strengthening And Promoting Innovation In The Nation’s Cybersecurity
Forrester's security and risk research team breaks down the key highlights and implications of former US President Joe Biden’s 2025 Executive Order (EO) 14144 on strengthening security, improving accountability for software and cloud service providers, and promoting innovation, including use of emerging technologies.
Blog
Rose-Colored Glasses Hide All The Red Flags: Advice From The S&R Forrester Women’s Leadership Program
As has now become a Forrester Security & Risk Summit tradition, a room full of amazing women and a few brave fellas gathered last week as part of the Forrester Women’s Leadership Program to celebrate successes and solve for the many challenges that women face in this field. The theme? “To propel your career in security and risk, choose your advisers and nuggets of advice wisely.”
Blog
European Cybersecurity Reflections, 2024
Get reflections on the legislative trends, geopolitical tensions, and other changes that impacted CISOs in the European Union in 2024.
Blog
Meet The New Analyst Covering NAV And Zero Trust
Meet the new Forrester analyst on the security and risk research team focusing on areas such as network analysis and visibility (NAV) and Zero Trust.
Blog
Don’t Trust Vendor Claims About Getting 100% On The MITRE ATT&CK Evaluations
The MITRE Engenuity ATT&CK Evaluations 2024 results are out. Get a detailed review in this preview of an upcoming report.
Blog
Three Things To Know About How Security Team Toxicity Can Increase Breach Risk
New research finds that engaged, healthy, psychologically safe, and collaborative security teams experience fewer breaches. Find out why.
Blog
March To The Beat Of Zero Trust
Zero Trust has become the standard information security model to adopt globally. It’s no longer a question of should; it’s a question of how and where to begin. For some time, the topic of Zero Trust was met with disparaging and opposing views proclaiming it to be another buzzword for vendors to market products. Well, […]
More posts