Cybersecurity Trends
Stay up-to-date on the cutting edge of cybersecurity with insights on Zero Trust, vendors, regulations, and other privacy & security topics.
Insights
Blog
Splunk Is Good For Cisco, But Cisco Needs To Convince Splunk Customers That Cisco Is Good For Them
On September 21, Cisco announced its intention to buy Splunk for $28 billion in cash, its largest acquisition ever and fourth this year. This is a massive investment and win for Cisco from two perspectives: observability and security. Cisco’s full-stack observability platform could catapult into relevance against established competitors overnight. Similarly, on the security side, […]
Blog
Announcing The Forrester Wave™: Vulnerability Risk Management, Q3 2023
A lot has changed since the last Forrester Wave™ evaluation on vulnerability risk management (VRM) in 2019. Since then, the VRM market has experienced several mergers, an unprecedented increase in volume of common vulnerabilities and exposure, and vulnerabilities such as Log4j that will forever live in infamy (and responder nightmares). All these factors mean that […]
Stay Ahead of Threats with These Cutting-Edge Detection Engineering Practices
Join us on Sept. 27 for a live webinar to learn how to enhance your security operations practice with agile and detection engineering practices.
Blog
“The Blob” Is Poisoning The Security Industry
The Blog in the security industry can prevent us from having the deep, real conversations about the actual issues practitioners are facing today. Find out how to avoid this.
Blog
Don’t Be A Passive Bystander — Take An Active Approach To Insider Risk
One of Forrester’s best practices for managing insider risk is to turn your employees into advocates for the program. Get five tips for how to do that in this preview of our upcoming Security & Risk event in November.
Blog
Break The Cycle Of Security And Technology Intergenerational Trauma
Learn what's creating the silos between technology and security teams and how to avoid or remove them.
Webinar
How To Enhance Your Security Operations Practice With Agile And Detection Engineering
Join us on Sept. 27 for a deep dive on detection engineering in security operations. Hear Forrester advice on best practices and the use of detection–as–code.
Blog
Your Product Security Approach Must Evolve With Your Organization’s Technology Strategy
Learn how specific investment choices can support your security organization’s evolution and maturity.
Strenthen Security Operations With Agile SecOps
Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.
Blog
Make Cyber Insurance Work For You
Learn why cyber insurance is a major opportunity in this preview of our upcoming Security & Risk Forum.
Blog
A Deep Dive Into The Forrester Wave™: Zero Trust Edge Solutions, Q3 2023
Get an inside look at the industry’s first evaluation of all-in-one Zero Trust Edge (ZTE) solutions, which some vendors call secure software-defined WAN (SD-WAN) and others call secure access service edge (SASE).
Blog
Prevent Data Turnovers With Insider Risk Management
Learn some valuable lessons about insider risk management from the New York Knicks and the Toronto Raptors. Really.
Blog
The State Of Data Security, 2023
Learn some of the key data security trends of the year including the causes of breaches, types of data being compromised, and post-breach effects and impact.
Blog
2003 Called, And It Doesn’t Want Its Email Security Appliances Back
Email security appliances have come a long way in the past 20 years. Learn the benefits of cloud-delivered email security.
Don't Get Misled By Unrealistic AI And Security Expectations
Learn the truth behind ML’s madness, how AI and security (really) work in detection and response, and red-flag claims to avoid.
Blog
The State Of Cyber Insurance, 2023
Cyber insurance is a common tool for risk transfer today. It’s also a key driver for cybersecurity program investment today. But who has cyber insurance and what benefits do organizations see from it? Analyzing Forrester data on cyber insurance adoption and breach response trends, we find that: Most organizations do not have standalone cyber insurance […]
Blog
Rubrik Acquires Laminar: Data Resilience And Security Join Forces
As security threats increase, data protection and security practices continue to merge. Data resilience firm Rubrik recently announced its acquisition of Laminar, a data security posture management (DSPM) vendor. Together, they aim to enable consistent and unified data security posture visibility that spans on-premises and cloud-based environments. Modern Data Resilience Is Increasingly A Cybersecurity Issue […]
Blog
Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]
Blog
Black Hat USA 2023: Insights From Our Short Vegas Residency
Black Hat USA 2023: Insights From Our Short Vegas Residency Black Hat has gone from being RSAC’s smaller tech and practitioner-focused cousin to being a commercial showcase for cybersecurity vendors. A tightly packed, noisy Business Hall included over 300 vendors and 400 organizations with booths, which was great for swag but bad for anyone with […]
Blog
Post-Quantum Security: Have You Started Your Journey?
The European Policy Centre recently published a quantum cybersecurity agenda for Europe in July 2023. This is yet another example of raising awareness and issuing calls to action for post-quantum security preparations. This follows the World Economic Forum and Deloitte issuing a perspective on transitioning to a quantum-secure economy in 2022. Also in late 2022, […]
Seven Steps To Bolstering Network Security With Zero Trust Edge
Watch this video to break down vendor ZTE hype and learn how to implement it across all endpoints in an enteprisewide networking fabric.
Blog
Vulnerability Management Strategies: Avoiding A Cyber Root Canal
Vulnerability management, like flossing, is not fun, exciting, or sexy, but we know that it’s a necessary component of good hygiene. There’s a ton of evidence and research to strongly substantiate its benefits, and yet we frequently struggle to do it despite clearly understanding the consequences — we certainly don’t want a root canal! Yet, […]
Blog
The Big Three Hyperscalers All Have Cloud-Native ZTNA Now
Zero Trust advocates have been on a campaign to #KillTheVPN for years, largely because VPNs provide too much (implicit) access and can become the entry point for malicious activity. The replacement technology is Zero Trust network access (ZTNA), and it is how most organizations are getting into Zero Trust today. ZTNA was the darling of […]
Blog
Nominate Your Organization For Forrester’s Security & Risk Enterprise Leadership Award
In June, Forrester announced our inaugural Security & Risk Enterprise Leadership Award. Today, we’re extending the deadline for submissions to September 12 to give applicants time to finish their much-needed summer vacations and complete the application process. The Security & Risk Enterprise Leadership Award will recognize organizations — and their leaders — that have transformed the […]
More posts