Skip to content
Forrester Logo
  • Who We Serve
    • Blank
      • TECHNOLOGY
        • Data, AI & Analytics
        • Security & Risk
        • Technology Architecture And Delivery
        • Technology
      • B2B
        • B2B Marketing
        • Product Management
        • Revenue
      • B2C
        • B2C Marketing
        • Customer Experience
        • Digital Business
    • Blank
      • INDUSTRIES
        • Financial Services
        • Government
        • Healthcare
        • High Tech
        • Retail & CPG
  • What We Offer
    • Blank
      • Forrester Decisions
        • The Forrester Wave™
        • Forrester AI
      • Forrester Market Insights
        • Advisory
        • Demand Generation
      • AI Access
      • Signature Research
    • Blank
      • Events
        • B2B Events
        • CX Events
        • Technology Events
        • Event Sponsorship
        • Awards
      • Analyst Relations Council
      • Certification
      • Reprints
  • How We Think
    • Blank
      • RESOURCES
        • AI Into Action
        • Blog Posts
        • Budget Planning Guides
        • Client Success Stories
        • Podcasts
        • Predictions
        • Webinars
    • Blank
      • FEATURED TOPICS
        • B2B Marketing Strategy
        • B2C Marketing Transformation
        • Cross-Functional Alignment
        • Customer Obsession
        • Emerging Technology
        • Generative AI
        • Risk Management
        • Technology Strategy
        • Zero Trust Security
  • Who We Are
    • About Us
    • Leadership
    • Board
    • Newsroom
    • Careers
    • Investor Relations
  • Events
    • Events
      • B2B Events
      • CX Events
      • Technology Events
    • Event Sponsorship
    • Webinars
    • Awards
  • Return to Forrester Platform
Forrester Cart Log In Become A Client
  • My Account
Forrester Cart
Log In
  • Return to Forrester Platform
  • Who We Serve
    • Blank
      • TECHNOLOGY
        • Data, AI & Analytics
        • Security & Risk
        • Technology Architecture And Delivery
        • Technology
      • B2B
        • B2B Marketing
        • Product Management
        • Revenue
      • B2C
        • B2C Marketing
        • Customer Experience
        • Digital Business
    • Blank
      • INDUSTRIES
        • Financial Services
        • Government
        • Healthcare
        • High Tech
        • Retail & CPG
  • What We Offer
    • Blank
      • Forrester Decisions
        • The Forrester Wave™
        • Forrester AI
      • Forrester Market Insights
        • Advisory
        • Demand Generation
      • AI Access
      • Signature Research
    • Blank
      • Events
        • B2B Events
        • CX Events
        • Technology Events
        • Event Sponsorship
        • Awards
      • Analyst Relations Council
      • Certification
      • Reprints
  • How We Think
    • Blank
      • RESOURCES
        • AI Into Action
        • Blog Posts
        • Budget Planning Guides
        • Client Success Stories
        • Podcasts
        • Predictions
        • Webinars
    • Blank
      • FEATURED TOPICS
        • B2B Marketing Strategy
        • B2C Marketing Transformation
        • Cross-Functional Alignment
        • Customer Obsession
        • Emerging Technology
        • Generative AI
        • Risk Management
        • Technology Strategy
        • Zero Trust Security
  • Who We Are
    • About Us
    • Leadership
    • Board
    • Newsroom
    • Careers
    • Investor Relations
  • Events
    • Events
      • B2B Events
      • CX Events
      • Technology Events
    • Event Sponsorship
    • Webinars
    • Awards
  • My Account
Become A Client
< Blogs
Home > Featured Blogs > How Do You Maintain Your Security Edge?

How Do You Maintain Your Security Edge?

Heidi Shey, Principal Analyst

Dec 7 2012
Categories
  • security risk management

Get The Insights At Work Newsletter

Thanks for signing up.

Stay tuned for updates from the Forrester blogs.

Now On Demand: 2026 Tech And Security Predictions

Missed it live? Watch our on-demand webinar to explore our 2026 predictions. Learn what tech and security leaders must do to lead with trust and value.

Watch Now
Blog

From Operating Rooms To iPhones: What The Stryker Attack Reveals About Third-Party Risk

Alla Valente 2 days ago
A recent cyberattack on a global medical device manufacturer shows how third-party failures can cascade from enterprise IT into patient-facing operations. This post unpacks what the incident reveals about concentration risk, vendor dependencies, and real-world impact.
Read More
Blog

White House Announces The 2026 Cyber Strategy For America

Allie Mellen 7 days ago
On Friday, March 6, the Trump administration released the latest US national cybersecurity strategy, President Trump’s Cyber Strategy for America, alongside an executive order on combating cybercrime and fraud. The document, focused on six core pillars, is the briefest cybersecurity strategy released by the US in the last decade. The biggest challenge with the document […]
Read More

Get The Insights At Work Newsletter

Thanks for signing up.

Stay tuned for updates from the Forrester blogs.

  • Who We Are
  • What We Believe
  • Executive Leadership
  • Our Board
  • Environmental, Social, And Governance
  • Our Objectivity
  • Brand
  • Newsroom
  • Careers
  • Investor Information
  • Analysts & Coverage Areas

  • What We Offer
  • Research
  • Certification
  • Consulting
  • Events
  • Analyst Briefings
  • Planned Research
  • Complimentary Webinars
  • Getting The Most From Forrester

  • About
  • Contact Us
  • Fraud Alerts
  • Glossary
  • Net Promoter Score
  • Policies
  • UK Slavery Statement

Terms Of Use
Privacy Policy
LinkedIn
YouTube
© 2026 Forrester Research, Inc. and/or its subsidiaries. All rights reserved.
Forrester Logo
  • Analyst Briefings
  • Newsroom
  • Complimentary Webinars
  • Contact Us
  • Investor Information
  • Careers
  • Policies
  • Podcasts
  • Fraud Alerts
  • Brand
  • UK Slavery Statement
Become A Client
Forrester Logo
© 2026 Forrester Research, Inc. and/or its subsidiaries. All rights reserved.
Terms of use Privacy Policy
  • LinkedIn
  • YouTube