cybersecurity

Insights

BLOG

Global Warming For Iceberg Metaphors

Josh Zelonis 4 days ago
The Dark Web Is Nothing Fancy; It’s Really Just A Different Series Of Protocols Commonly when surfing the web, Transport Layer Security (TLS) is the cryptographic protocol that provides confidentiality for your communication with the server. The green lock on your URL bar is an assurance, but not a guarantee, that you’re communicating confidentially with […]
Read More
BLOG

Unconventional Wisdom: Explore Paying The Ransom In Parallel With Other Recovery Options

Josh Zelonis June 4, 2019
Your organization has just received ransom notices across your infrastructure, informing you of what you already fear. All your critical business data has been encrypted. You are angry that someone’s moved your cheese, and you don’t want to reward them for it. Your emotions are confirmed by advisors who give you the conventional advice: “Don’t […]
Read More

Future-Proof Your Business With Zero Trust

Prioritize your next steps towards a Zero Trust strategy and architecture.

BLOG

Cyber Catalyst Brings Minimal Value To Businesses

Heidi Shey April 8, 2019
In late March, Marsh announced the launch of a program with a number of leading cyberinsurance firms including Allianz, AXA, Beazley, XL, and Zurich to evaluate cybersecurity products and services. Products that meet a minimum standard of criteria receive the designation of “Cyber Catalyst” for their effectiveness in reducing cyber risk. The intent is for […]
Read More
BLOG

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Jeff Pollard March 25, 2019
Today we released our 2019 security & risk recommendations report. We collected contributions from our colleagues across the Forrester security & risk team to identify the most important actions security leaders should take in 2019. Turns out, things are getting better for S&R pros, but challenges still remain. Security leaders have earned board-level visibility, privacy […]
Read More
BLOG

Don’t Drink From A Poisoned Well — Mitigate Supply Chain Risk With Zero Trust

Josh Zelonis March 25, 2019
Motherboard and Kaspersky unveiled that hackers compromised a server of computer manufacturer ASUS’s live software update tool to install a malicious backdoor on thousands of computers. The malicious file was able to masquerade as an authentic software update as it was signed with legitimate ASUS digital certificates. The manufacturer unwittingly pushed out the backdoor to […]
Read More
BLOG

Make No Mistake — Microsoft Is A Security Company Now

Josh Zelonis March 22, 2019
Microsoft has announced support for macOS in its rebranded Microsoft Defender ATP product, taking this product from being an offering that could be considered an add-on for hardening its own operating system to a multiplatform security solution. While this is an early release, it is a clear signal of the investment Microsoft is making to […]
Read More
PODCAST

Strategy, Not Technology, Is The Key For Better Cybersecurity

What It Means March 14, 2019
The tagline for this year’s RSA Conference was “Better.” According to Forrester VP and Group Director Laura Koetzle, this tagline is apt. Cybersecurity is a jigsaw puzzle still in its box: All the tech pieces are there, but forging the right configurations and strategies remains a to-do for most.
Listen Now

Reinvent Your Security Strategy With Zero Trust

Just as your business becomes increasingly data-centric, so must your security strategy and architecture.

VIDEO

The Forrester Wave™: Managed Security Services In Asia Pacific, Q1 2019 Identifies The 11 Most Important Vendors

Jinan Budge March 13, 2019
CISOs in Asia Pacific must justify their spending and articulate the business value of often expensive investments in managed security to a largely non-security audience of executives. Currently, this is nearly impossible: Many managed security service providers (MSSPs) continue to go to market with messaging that is technology-centric and blind to the benefits they provide […]
Watch Now
BLOG

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Laura Koetzle March 4, 2019
I recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here. We tried to expose as much as we could of the fantastic variety that you’ll find at RSA Conference 2019. Here’s a further elaboration of one of my favorite […]
Read More
BLOG

Cunning Plans Are In Short Supply In 2019 Brexit Britain

Paul McKay January 22, 2019
With no Brexit deal signed, European CISOs should be ready to face chaos. Here are five key concerns CISOs must consider and prepare for.
Read More
BLOG

New Tech Spotlight: Security Technology Takes Center Stage

Carlton Doty January 14, 2019
Venture capital and private equity spending on security technology reached an all-time high in 2018. Currently, this emerging technology market sector stands at about $31 billion in total funding. While that total may pale in comparison to other fast-growing markets such as fintech ($124 billion) or transportation tech ($150 billion), consider that 65% of that $31 […]
Read More
BLOG

Phishing: The Simple Attack That Shreds The Defenses Of Sensitive Networks

Joseph Blankenship December 20, 2018
Diplomatic networks carry some of the world’s most sensitive information: communications between world leaders, key technical intellectual property, trade strategies, and military plans. A recent report by antiphishing vendor Area 1 Security reveals that a three-year-long cyberattack led to the successful breach of the European Union’s diplomatic communications network. By focusing on the cybersecurity of the […]
Read More
BLOG

Marriott Breach: Starwood Hacker Gains Access To 500 Million Customer Records

Jeff Pollard November 30, 2018
Another Friday, Another Breach Announcement Today, Marriott announced that it uncovered four-plus years of a previously unknown, unexpected, and unauthorized data breach that includes travel details, passport numbers, and credit card data. Five hundred million customers found out this morning when Marriott announced a multiyear breach dating back to 2014. Longstanding defects in Starwood’s database and network […]
Read More
BLOG

The Fight For Cybersecurity Brand Dominance Intensifies

Jeff Pollard November 16, 2018
“Everything Is An Endpoint” Brings BlackBerry Back From The Dead For many, the fact that BlackBerry still exists — and the fact that it spent $1.4 billion of the $2.4 billion in capital it had — is the most surprising part of the Cylance acquisition. BlackBerry hasn’t shirked its mythological status as the case study of what […]
Read More
BLOG

Examine The Cybersecurity Risk Ratings Market With The Forrester New Wave™ Evaluation

Nick Hayes November 13, 2018
The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018 Earlier today, we published “The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018” evaluation. We take a close look at the nine most important vendors in this rising market, reviewing their current capabilities, customer references, and strategic road maps. This includes vendor profiles, with our analysis and buyer […]
Read More
BLOG

Predictions 2019: Cybersecurity Faces Old Familiar Foes, Costly New Attacks, And Welcome Leadership Changes

Amy DeMartine November 5, 2018
Next year, the biggest challenges to the cybersecurity industry will come from outside forces. In 2019, geopolitical trends will reintroduce old enemies and escalate issues of cyberespionage and sabotage. As criminals follow the money — as they are wont to do — they will use emerging technologies to go after commerce in a BIG way. […]
Read More
BLOG

Forrester’s Cyber Predictions For 2019: The European Take

Paul McKay November 5, 2018
Today, my team published Forrester’s predictions for the cybersecurity industry in 2019. We listed five key trends that we think will impact the industry over the next 12 months. Here is my take on how three of these trends will play out in the European cybersecurity market: Economic espionage in Europe will increase due to […]
Read More

 

Collaborate To Tackle Your Challenges

Learn and co-create with a council of your peers.

BLOG

Computational Propaganda: How Your Organization Could Be Attacked Like A Politician

Chase Cunningham October 18, 2018
Sending malicious payloads and packets is no longer the standard in threat operations. In today’s world of massive social media presence and influence, malicious actors can bring an organization to its knees — 280 characters at a time. This isn’t an attack on your infrastructure but an attack of computational propaganda aimed to shape a divisive […]
Read More
BLOG

IBM Bets Big On Security Training And Leadership As A Differentiator

Stephanie Balaouras October 16, 2018
In late 2016, IBM announced the availability of its full-scale cyber range at the Cambridge, MA headquarters of its security division. With two shifts per day and currently booked out six to eight months, it’s been a huge success for the division. The range isn’t just about training security incident response analysts; it’s a full […]
Read More
BLOG

European Intelligence Announcement Shows The Importance Of Assessing Geopolitical Risks

Paul McKay October 5, 2018
Today, we in Europe woke up to headlines about attempted cyberattacks by Unit 26165 of Russia’s GRU intelligence service. In a world where the attribution of cyberattacks is a notoriously difficult task, the UK, the Netherlands, and the US made a joint announcement of the foiling of an attempt by four hackers linked to Unit […]
Read More
More posts