threat intelligence

Threat intelligence is a priority for many cybersecurity organizations. But it remains elusive and difficult. Read our insights.

Discover how Forrester supports IT leaders. 

Insights

Blog

The European Cybersecurity Consulting Services Market Is Ready For Disruption

Madelein van der Hout March 12, 2024
As digital threats grow more sophisticated and European and international regulatory landscapes more intricate, the role of cybersecurity consulting services is critical. Hence, I’m excited to announce The Forrester Wave™: Cybersecurity Consulting Services In Europe, Q1 2024 (available for Forrester clients). In this report, my colleagues and I scrutinize the offerings of major players in […]
Blog

Putting The New Joint Cyber Defense Collaborative Priorities Into Action

Brian Wrozek February 20, 2024
The US Cybersecurity and Infrastructure Security Agency (CISA) recently announced the 2024 cybersecurity priorities for the Joint Cyber Defense Collaborative (JCDC). Get a preview of them in this blog.

Conquer Your GenAI Security, Risk & Privacy Fears

Watch our webinar to learn how security leaders can identify and manage enterprise genAI risk across models, APIs, and applications — and follow paths to secure, trusted adoption.

Blog

Insider Intercepted In Fantasy Football Game

Joseph Blankenship February 15, 2024
Forrester data shows that 22% of data breaches in 2023 were the result of internal incidents. What does that have to do with fantasy football? Find out in this post.
Webinar

Secure Your Use Of Generative AI

Watch and learn how to use a security framework to secure genAI adoption and explore the security controls and skills crucial for safeguarding this emerging technology.
Blog

Very Human Takeaways From An AI Event

Phyllis Davidson December 20, 2023
Learn key takeaways from the 2023 Berkeley Business Analytics & AI Summit, which had the theme of “Analytics, AI, and Society: Towards a Wiser World?”
Webinar

Ransomware Defense For Constrained State And Local Budgets

Explore the state of ransomware vulnerability for state and local governments — and how you can protect your agency with limited resources.
Blog

Protecting Against The Top Cybersecurity Threats In 2023 Requires A Balanced Approach

Brian Wrozek May 1, 2023
Get a preview of the top five cybersecurity threats — established and emerging — for this year and learn how to defend against each.

Stay Ahead Of Threats With Detection And Response Engineering

Enhance your security operations by learning the latest detection and response engineering practices.

Blog

Supply Chain Shortage Of Transformers: More Than Meets The Eye

Alla Valente January 18, 2023
They say the most inopportune time to buy an umbrella is when it’s raining. That’s exactly what’s happening now to US utilities companies scrambling to procure a critical component required to beef up or repair power lines just as the US hurricane season arrives. At the heart of the headache, for the fourth year in […]
Blog

Vulnerability Programs Must Regain Trust To Inspire Action

Erik Nost August 17, 2022
Is using CVSS scores for risk prioritization leading to misalignment and even mistrust in your organization? Find out in this Security & Risk event session preview.
Blog

Meet The New Analyst Covering OT Security: Brian Wrozek

Brian Wrozek July 27, 2022
What Topics Will You Be Covering At Forrester? I am very excited to be covering security and risk for operational technology (OT) environments, including the critical infrastructure and manufacturing industries. This is a growing area of concern because OT-specific attacks are increasing and the stakes are higher regarding the potential impact to human safety and […]
Blog

It’s Christmas In July For Three Threat Intelligence Startups

Brian Kime July 19, 2021
Christmas came early for three vendors in the threat intelligence and attack surface management space this past week. In a reported all-cash $500 million deal (no need for layaway when your market cap is north of $2 trillion), Microsoft acquired threat intelligence and attack surface management vendor RiskIQ. In Europe, Swedish vulnerability risk management firm […]
Blog

Announcing The Forrester Wave™: External Threat Intelligence Services, Q1 2021

Brian Kime March 23, 2021
We are thrilled to announce the publication of “The Forrester Wave™: External Threat Intelligence Services, Q1 2021.” External threat intelligence services (ETIS) are important to security teams to fill gaps in their existing collection plans with specialized services that will enhance their existing cyber defense and reduce risk. External threat intelligence services are different in […]

Strenthen Security Operations With Agile SecOps

Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.

Blog

Stay Vigilant Of The 2021 Threat Landscape And Help Your Org Prepare For “The Next Normal”

Brian Kime March 16, 2021
Earlier this month, a US State Department spokeswoman announced that the US had identified three online publications that were attempting to discredit the Pfizer and Moderna vaccines, all of which were directed by Russian intelligence. In Forrester’s annual report on top security threats, we explore the top security threats that security professionals must monitor, including […]
Blog

Reflections On 2020: Cybersecurity Predictions Versus Reality

Heidi Shey February 8, 2021
You’re probably tired of hearing about 2021 cybersecurity predictions. This is something different. We’re taking a look back to what we predicted would happen in 2020 and grading our predictions. After all, why make predictions in the first place if we’re not going to reflect and assess ourselves afterward? When we make predictions, we aim to identify what is different that we think […]
Blog

Cybersecurity Lessons Learned From Snowmageddon

Brian Kime January 28, 2021
Social media reminded us that seven years ago, a mere two inches of snow in the middle of the day shut down Atlanta, our beloved city. It’s now affectionally referred to as Snowmageddon or Snowpocalypse. We both worked at competing security vendors then — Brian in the office at the Secureworks HQ in Sandy Springs (just […]
Blog

Voulez-Vous Parler Social Networks’ Content Moderation Policies?

Jessica Liu January 15, 2021
My father told me once, “If you see something wrong happening in the world, you can either do nothing, or you can do something.” And I already tried nothing. — Steve Trevor, Wonder Woman Social networks, tech vendors ingesting social data, and brands running social listening practices might all be wondering the same thing right […]
Blog

Demystifying The Information Sharing Alphabet Soup

Josh Zelonis October 21, 2019
Cyberthreat intelligence (CTI) is an overcrowded space that is overdue for contraction. In general, we see it filled with smaller vendors with founders who come from an intel background, got enough funding to land a Fortune 100 client (not exclusively, mind you), and have put their logo into every pitch deck they use when going […]

Learn How AI Can Be Used In Detection And Response

Watch this video for a reality check on what can (and can’t) be done with AI and security.

Blog

Global Warming For Iceberg Metaphors

Josh Zelonis June 13, 2019
Sorting through the smoke and mirrors surrounding the dark web to deliver the truth about what it is, what it does, and what it means.
Blog

Understanding The Evolving DRP Market

Josh Zelonis April 19, 2019
Sixty-four percent of global security decision makers recognize that improving their threat intelligence capabilities is a high or critical priority. Nevertheless, companies across many industries fail to develop a strategy for achieving this. Among the many reasons why organizations struggle to develop a threat intelligence capability, two stand out: Developing a mature threat intelligence program […]
Blog

Cunning Plans Are In Short Supply In 2019 Brexit Britain

Paul McKay January 22, 2019
With no Brexit deal signed, European CISOs should be ready to face chaos. Here are five key concerns CISOs must consider and prepare for.
More posts