cybersecurity

Stay up-to-date on the cutting edge of cybersecurity with insights on Zero Trust, vendors, regulations, and other privacy & security topics.

Insights

BLOG

Maintain Your Security Edge: Develop And Retain Cybersecurity Talent

Heidi Shey 12 hours ago
As an industry, we gripe about hiring and struggle with retention. My colleagues Jeff, Chase, and JB have written about how the cybersecurity staffing shortage is predominantly self-inflicted in hiring practices, while Stephanie and Claire have written about best practices for recruiting and retaining women in cybersecurity. What’s Next? Recruiting and hiring is one part […]
Read More
PODCAST

Let’s Reverse Cybersecurity’s Self-Inflicted Staffing Shortage

What It Means August 15, 2019
On this episode of What It Means, VP and Group Director Stephanie Balaouras and VP and Principal Analyst Jeff Pollard dissect the myths, misconceptions, and half-truths within the current cybersecurity staffing shortage — and discuss a more effective way for security and risk leaders to build a complete, qualified team.
Listen Now

Five Steps To Zero Trust Security

How to achieve and maintain Zero Trust.

VIDEO

Zero Trust In Action

Chase Cunningham August 8, 2019

Watch Now
BLOG

Top Security Technology Trends In 2019: Transforming The Future Of Work In Security

Amy DeMartine August 7, 2019
Walk the show floor at any security event, and you will be inundated with a multitude of purportedly cutting-edge and disruptive security technologies. When every vendor claims that their solution is unique, and that no security program would be complete without it, how do you cut through the noise to pinpoint what you must pay […]
Read More
BLOG

Security & Risk 2019: Cybersecurity’s Staffing Shortage Is Self-Inflicted

Joseph Blankenship August 6, 2019
Current projections show that we will have nearly two million job vacancies in the security sector by 2022. However, this is a problem of our own making. Fixing this will require changes to the way we hire, train, and retain security pros.
Read More
BLOG

Cybersecurity Risk Ratings Are Here To Stay — Learn To Work With Them

Paul McKay July 31, 2019
Cybersecurity risk rating solutions are a polarizing topic for security leaders. We meet promoters and detractors in roughly equal measure in the customers that we speak to. Positive client sentiment cites the ability to continuously monitor their third parties, and the simplicity of the quantifiable risk score is popular. Security leaders tell us it is […]
Read More
BLOG

Security Budgets In Asia Pacific, 2019

Jinan Budge July 15, 2019
It has taken me 15 months and a LOT of travel, listening, and talking to feel confident enough to write this research for APAC. APAC is a unique region in its cultural, geographic, regulatory, security maturity, and economic diversity. Writing anything APAC-related (at least for me) meant that I needed to understand the region with […]
Read More

Zero Trust In Practice

The theory of Zero Trust was penned by Forrester almost a decade ago. Now, we help you put it in practice.

BLOG

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Heidi Shey July 8, 2019
Does your organization have a strategy for protecting employees at home as a part of your overall cybersecurity program? Something that could include, but really goes to a place that is beyond, awareness training? If You Answered “No,” You’re Not Alone Employee privacy is a big reason why not. And yet, as the connected smart […]
Read More
BLOG

A Typical Day Of Analyst Life

Heidi Shey June 27, 2019
We’re hiring! Forrester’s security and risk research team is growing and currently has four open analyst positions: identity and access management, application security, security analytics, and Zero Trust. When I speak to candidates about the analyst role, they all ask one question that I find difficult to answer: “What’s a typical day like for an […]
Read More
BLOG

It’s Here: The 2019 Forrester Global Map Of Privacy Rights And Regulations

Enza Iannopollo June 24, 2019
Security and risk leaders consistently rank compliance with global privacy regulations as one of their top three challenges. To help them, Forrester periodically updates our map of global privacy rights and regulations. We released our 2019 version today. This year, we included 61 countries, adding Kuwait, the Philippines, Qatar, Saudi Arabia, Sri Lanka, the United […]
Read More
BLOG

Global Warming For Iceberg Metaphors

Josh Zelonis June 13, 2019
Sorting through the smoke and mirrors surrounding the dark web to deliver the truth about what it is, what it does, and what it means.
Read More
BLOG

Unconventional Wisdom: Explore Paying The Ransom In Parallel With Other Recovery Options

Josh Zelonis June 4, 2019
Your organization has just received ransom notices across your infrastructure, informing you of what you already fear. All your critical business data has been encrypted. You are angry that someone’s moved your cheese, and you don’t want to reward them for it. Your emotions are confirmed by advisors who give you the conventional advice: “Don’t […]
Read More

Future-Proof Your Business With Zero Trust

Prioritize your next steps towards a Zero Trust strategy and architecture.

BLOG

Cyber Catalyst Brings Minimal Value To Businesses

Heidi Shey April 8, 2019
In late March, Marsh announced the launch of a program with a number of leading cyberinsurance firms including Allianz, AXA, Beazley, XL, and Zurich to evaluate cybersecurity products and services. Products that meet a minimum standard of criteria receive the designation of “Cyber Catalyst” for their effectiveness in reducing cyber risk. The intent is for […]
Read More
BLOG

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Jeff Pollard March 25, 2019
Today we released our 2019 security & risk recommendations report. We collected contributions from our colleagues across the Forrester security & risk team to identify the most important actions security leaders should take in 2019. Turns out, things are getting better for S&R pros, but challenges still remain. Security leaders have earned board-level visibility, privacy […]
Read More
BLOG

Don’t Drink From A Poisoned Well — Mitigate Supply Chain Risk With Zero Trust

Josh Zelonis March 25, 2019
Motherboard and Kaspersky unveiled that hackers compromised a server of computer manufacturer ASUS’s live software update tool to install a malicious backdoor on thousands of computers. The malicious file was able to masquerade as an authentic software update as it was signed with legitimate ASUS digital certificates. The manufacturer unwittingly pushed out the backdoor to […]
Read More
BLOG

Make No Mistake — Microsoft Is A Security Company Now

Josh Zelonis March 22, 2019
Microsoft has announced support for macOS in its rebranded Microsoft Defender ATP product, taking this product from being an offering that could be considered an add-on for hardening its own operating system to a multiplatform security solution. While this is an early release, it is a clear signal of the investment Microsoft is making to […]
Read More
PODCAST

Strategy, Not Technology, Is The Key For Better Cybersecurity

What It Means March 14, 2019
The tagline for this year’s RSA Conference was “Better.” According to Forrester VP and Group Director Laura Koetzle, this tagline is apt. Cybersecurity is a jigsaw puzzle still in its box: All the tech pieces are there, but forging the right configurations and strategies remains a to-do for most.
Listen Now
VIDEO

The Forrester Wave™: Managed Security Services In Asia Pacific, Q1 2019 Identifies The 11 Most Important Vendors

Jinan Budge March 13, 2019
CISOs in Asia Pacific must justify their spending and articulate the business value of often expensive investments in managed security to a largely non-security audience of executives. Currently, this is nearly impossible: Many managed security service providers (MSSPs) continue to go to market with messaging that is technology-centric and blind to the benefits they provide […]
Watch Now
BLOG

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Laura Koetzle March 4, 2019
I recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here. We tried to expose as much as we could of the fantastic variety that you’ll find at RSA Conference 2019. Here’s a further elaboration of one of my favorite […]
Read More
BLOG

Cunning Plans Are In Short Supply In 2019 Brexit Britain

Paul McKay January 22, 2019
With no Brexit deal signed, European CISOs should be ready to face chaos. Here are five key concerns CISOs must consider and prepare for.
Read More
More posts