Cybersecurity Trends
Stay up-to-date on the cutting edge of cybersecurity with insights on Zero Trust, vendors, regulations, and other privacy & security topics.
Insights
Blog
Reflections On 2020: Cybersecurity Predictions Versus Reality
You’re probably tired of hearing about 2021 cybersecurity predictions. This is something different. We’re taking a look back to what we predicted would happen in 2020 and grading our predictions. After all, why make predictions in the first place if we’re not going to reflect and assess ourselves afterward? When we make predictions, we aim to identify what is different that we think […]
Read More
Blog
Stop Trying To Take Humans Out Of Security Operations
Security tools cannot do what humans can do. Instead of replacing humans in the security operations center, augment them so they can do what they are good at.
Read More
Predictions 2021 Hub
Explore our blog posts, videos, guides, and other resources to understand the dynamics that will shape 2021.
Blog
Privacy And Security: We Need Both For Communications, And There’s An App For That
Is WhatsApp safe for business use? Principal Analyst Heidi Shey provides insight for CISOs.
Read More
Blog
Awareness Isn’t Enough — It’s Time To Change Behaviors
I am thrilled to announce my latest research, “How To Manage The Human Risk In Cybersecurity.” It’s research I’ve been leading and evolving since 2010, changing my mind about the title with each refresh to reflect the times. In 2010, for example, we focused on “How To Communicate And Promote Security To Gain Influence And […]
Read More
Blog
Recent Dragos Funding Round Demonstrates Growing Demand For OT Security Solutions
Operational technology (OT) and industrial control system (ICS) security are vitally important for the safety of the people who work in critical infrastructure and manufacturing. OT security is also necessary for the consumers of the energy, drinking water, and products made in our industrial facilities. OT security is a unique security domain of growing importance, and yesterday’s announcement of Dragos’ Series C funding round of $110 million is another validation of […]
Read More
Blog
The Security Snapshot: Are You “More” Normal?
The COVID-19 pandemic unequivocally changed how employers think the workforce could and should look like. As firms have been growing more acclimated to the “new normal,” insider threats, breaches, and employee unrest are on the rise. You need to know which security vendors fit your needs and which strategies to take. As we head into month […]
Read More
Blog
Thinking Ransomware Defense: Air Gaps?
Air Gaps Aren’t Effective; Scratch Them From Your List . . . The number of companies falling victim to ransomware attacks continues to grow each day. Ransomware inflicts extreme pain, leading to business closure or significant business disruptions. Vendors are developing technology architectures and approaches to solve for these challenges. Each technology and approach has […]
Read More
Blog
Predictions 2021: The Path To A New Normal Demands Increased Cybersecurity Resilience
In 2021, culture issues, budgets, and vendor shifts will be top priorities for cybersecurity leaders. Learn more in our 2021 cybersecurity predictions.
Read More
Blog
Predictions 2021: Technology And Customer Obsession Help Firms Emerge From Crisis Mode
It has never been more important for organizations to anticipate change, strengthen resilience, and become truly customer obsessed. Heading into 2021, technology — both new and existing — will help firms achieve these aims and emerge from the crisis on sound footing.
Read More
Blog
New Research: Emerging Use Cases And Risks For Biometrics
Biometric authentication is a powerful technology with many compelling use cases but is not without controversy and distinct risks. What are users’ privacy rights in how biometric information is processed and stored? How are biometrics regulated around the world? How can the use of biometrics lead to discriminatory practices? What security shortcomings are associated with […]
Read More
Blog
Preparing For The Future: The 2020s Will Demand More From Your Tech
The 2020s announced their arrival with a bang this year. Find out what IT leaders can do to better align their tech stack to the coming wave of risks and changes.
Read More
Blog
The Security Snapshot: Improving Your Security Posture During A Global Crisis
The COVID-19 global pandemic was top of mind for security leaders (and everyone else) during the second quarter of 2020. Forrester’s security and risk (S&R) team focused on pandemic recovery and looked at myriad ways to renew your security program and give it new life — from the development of talent and the future of […]
Read More
COVID-19: Responding, Managing, And Leading During A Pandemic
The latest insights and guidance for leaders to address the growing business and employee experience implications of COVID-19.
Blog
Microsoft Purchases CyberX
Today, Microsoft announced that it has acquired Waltham, Massachusetts-based internet-of-things (IoT) and industrial control system (ICS) security vendor CyberX. While the purchase price was not disclosed, media reports are speculating that the purchase price was somewhere between $150–$165 million. Founded in 2013, CyberX has raised $48 million in venture capital, so this deal provides a good return to investors. CyberX’s core solution can monitor IoT and ICS environments […]
Read More
Blog
Introducing The Forrester New Wave™: Connected Medical Device Security, Q2 2020
We are thrilled to announce that “The Forrester New Wave™: Connected Medical Device Security, Q2 2020” is now live. This report will help you understand how the top eight vendors in the emerging medical device security space stack up against 10 different criteria. We looked at product functionality and vendor strategy through live demos and […]
Read More
Blog
Don’t Reward The Brilliant Jerk
Is a toxic culture holding your security team back? Learn how to address the issue directly and create a more positive environment.
Read More
Blog
Address Legal, Regulatory, And Operational Risks For The Return To Work
In addition to government guidelines, firms must consider a number of other factors in bringing employees back to work. Here are four areas you might not be thinking about.
Read More
Blog
A Small Victory For Securing The US Bulk Power System
It is long overdue to secure the United States’ bulk power system supply chain. As early as 2007, researchers demonstrated how digitization of power systems introduces vulnerabilities that can cause physical damage. In 2015, intruders, likely sponsored or directed by the Russian government and known colloquially by the name Sandworm, breached multiple Ukrainian electric utilities and shut off power for hundreds of thousands of […]
Read More
Blog
CISOs And The Da Vinci Fallacy
The belief that security leaders must show mastery across knowledge domains is dangerous. It's also a symptom of an underlying ailment.
Read More
Blog
When It Comes To Saving Lives, Cybersecurity Pros Emerge As Influencers
As concerns swirl around COVID-19 contact-tracing apps, privacy and security leaders are playing a critical role in building public trust.
Read More
More posts