information security

Insights

BLOG

Maintain Your Security Edge: Develop And Retain Cybersecurity Talent

Heidi Shey August 21, 2019
Cybersecurity talent is scarce. Developing and retaining current employees can help you maintain your edge and defray expensive recruiting costs. Learn more.
Read More
BLOG

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Heidi Shey July 8, 2019
Does your organization have a strategy for protecting employees at home as a part of your overall cybersecurity program? Something that could include, but really goes to a place that is beyond, awareness training? If You Answered “No,” You’re Not Alone Employee privacy is a big reason why not. And yet, as the connected smart […]
Read More

Five Steps To Zero Trust Security

How to achieve and maintain Zero Trust.

BLOG

Research Announcement — Forrester Wave™ For Q4 Of 2019: European Cybersecurity Consulting Service Providers

Paul McKay May 7, 2019
We are currently considering the list of vendor participants that we are planning to invite to a prescreener for our upcoming Forrester Wave™ evaluation in Q4 of this year on European cybersecurity consulting service providers. If you provide cybersecurity consulting services to customers headquartered in Europe and you operate in more than one key European […]
Read More
BLOG

Zero Trust Goes Mainstream In Europe

Paul McKay April 25, 2019
Over the Easter weekend, we released a new research report looking at implementing Zero Trust in Europe. When we started, we knew that a one-size-fits-all approach would not work in Europe. In addition, general awareness of the Zero Trust security model is much lower in Europe than in the US. Unheard of 12 months ago […]
Read More
BLOG

Cyber Catalyst Brings Minimal Value To Businesses

Heidi Shey April 8, 2019
In late March, Marsh announced the launch of a program with a number of leading cyberinsurance firms including Allianz, AXA, Beazley, XL, and Zurich to evaluate cybersecurity products and services. Products that meet a minimum standard of criteria receive the designation of “Cyber Catalyst” for their effectiveness in reducing cyber risk. The intent is for […]
Read More
BLOG

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Jeff Pollard March 25, 2019
Today we released our 2019 security & risk recommendations report. We collected contributions from our colleagues across the Forrester security & risk team to identify the most important actions security leaders should take in 2019. Turns out, things are getting better for S&R pros, but challenges still remain. Security leaders have earned board-level visibility, privacy […]
Read More
BLOG

New Tech Spotlight: Security Technology Takes Center Stage

Carlton Doty January 14, 2019
Venture capital and private equity spending on security technology reached an all-time high in 2018. Currently, this emerging technology market sector stands at about $31 billion in total funding. While that total may pale in comparison to other fast-growing markets such as fintech ($124 billion) or transportation tech ($150 billion), consider that 65% of that $31 […]
Read More

Zero Trust In Practice

The theory of Zero Trust was penned by Forrester almost a decade ago. Now, we help you put it in practice.

BLOG

Examine The Cybersecurity Risk Ratings Market With The Forrester New Wave™ Evaluation

Nick Hayes November 13, 2018
The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018 Earlier today, we published “The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018” evaluation. We take a close look at the nine most important vendors in this rising market, reviewing their current capabilities, customer references, and strategic road maps. This includes vendor profiles, with our analysis and buyer […]
Read More
BLOG

European Intelligence Announcement Shows The Importance Of Assessing Geopolitical Risks

Paul McKay October 5, 2018
Today, we in Europe woke up to headlines about attempted cyberattacks by Unit 26165 of Russia’s GRU intelligence service. In a world where the attribution of cyberattacks is a notoriously difficult task, the UK, the Netherlands, and the US made a joint announcement of the foiling of an attempt by four hackers linked to Unit […]
Read More
BLOG

You Need A Plan To Adapt To Climate Change — Today

Stephanie Balaouras August 28, 2018
At Forrester’s upcoming Privacy & Security Europe 2018 Forum, I’ll be presenting on a topic that I’m both personally and professionally passionate about: climate change adaptation. Forrester prides itself on providing actionable advice to help business and technology leaders build customer-obsessed strategies that drive growth. And so I suspect many of you are surprised by […]
Read More
BLOG

Join Us At Forrester’s Privacy & Security 2018 Forum

Chris McClean August 8, 2018
Those of us who care about cybersecurity and privacy are a special breed. As long as these disciplines have been around, technologies have gotten more complex, threats have gotten more dangerous, and expectations have skyrocketed. Yet we have not simply persevered; we are now guiding top executives and policymakers to think differently about business models […]
Read More
BLOG

Digital Risk Protection In 2018: New Vendors, New Leaders, New Wave

Nick Hayes July 17, 2018
Digital Risk Protection In 2018: New Vendors, New Leaders, New Wave Our “The Forrester New Wave™: Digital Risk Protection, Q3 2018” report is out! Take a look at how 14 DRP vendors stack up in this emerging market. You will find detailed vendor profiles and analysis evaluating how well they monitor and mitigate organizations’ external, […]
Read More

Future-Proof Your Business With Zero Trust

Prioritize your next steps towards a Zero Trust strategy and architecture.

BLOG

Your 2018 Guide To Cyberinsurance Is Here!

Nick Hayes June 26, 2018
Forrester’s 2018 Guide To Cyberinsurance Today, no one is 100% secure — believing otherwise is hubris of Icarian proportions. This reality is a core reason why more organizations are turning to cyberinsurance. Because without it in some form (whether it’s a purchased policy or their own allocated cash reserves), they have no safety net to stymie […]
Read More
BLOG

Building The Language Bridge Between Security And The C-Suite

Jinan Budge June 8, 2018
If you had half an hour with a board member and you wanted to get coaching from them about how to communicate with them about security, what would you ask them? In a few weeks’ time, I will have just that opportunity when I facilitate a panel with some prominent board directors. Getting inside the […]
Read More
BLOG

Introducing Forrester’s Asset Intelligence Model (AIM) For Asset Management

Josh Zelonis May 7, 2018
During my presentation at RSA Conference 2018 this year, I discussed what I refer to as the “Heisenberg Uncertainty Principle of Asset Management,” which states that it’s impossible to maintain an asset inventory list in a constantly evolving environment. Think of it this way: Your IT infrastructure is probably a lot like a giant jelly […]
Read More
BLOG

Why Is One Woman Not Good Enough?

Stephanie Balaouras May 1, 2018
This weekend, The New York Times released a story detailing a sexist, toxic culture that’s been tormenting Nike employees for years. The story shares instances of sexist comments, work trips to strip clubs, sexually graphic conversations, and unwanted advances that’ve forced many women to quit over the years. But did they go to HR? Yes. […]
Read More
BLOG

The Self-Licking Ice Cream Cone Of Misery For S&R Pros Starts With Startups

Chase Cunningham April 26, 2018
Over the past two weeks, I was at the annual shenanigan bonanza that is the RSA Conference and was also invited to sit on a “Shark Tank” panel for emerging technology startups in Miami. In the span of two weeks, I went from seeing big, well-established companies with massive marketing budgets and millions of dollars […]
Read More
BLOG

EDR Convergence Into Traditional Endpoints Is Overblown And Misdirected

Josh Zelonis March 27, 2018
  I’m going to start this blog post by saying that if you only read one paragraph, scroll down and make it the last one. I’m frequently approached by vendors who want to know my thoughts on the convergence of endpoint detection and response (EDR) and endpoint protection (EP) into a single-agent solution. “It only […]
Read More
BLOG

Next-Generation Access and Zero Trust

Chase Cunningham March 27, 2018
A few years ago, the concepts of microsegmentation and microperimeters for Zero Trust were championed by former Forrester analyst John Kindervag. He showed us how those concepts and their technologies could enable a more secure enterprise. Once those concepts and their associated best practices hit the street, organizations from VMware to Cisco Systems to Palo […]
Read More
BLOG

Let’s Address Cybersecurity’s Gender Disparity

Stephanie Balaouras February 27, 2018
The most infuriating advice I’ve received about succeeding in cybersecurity is to, “Have a thick skin,” usually followed by, “Don’t take him seriously, he doesn’t even realize what he’s saying.” These are not words of wisdom—they’re a defense of predatory behavior that belittles the issues women face every day and normalizes sexual harassment. For my […]
Read More
More posts