Generative AI Goes Mainstream In Security With Microsoft Security Copilot
Typically, security is late to the game with technology innovation. Before we get to see innovative technology, we have to wait for it to matter to security. This time, however, is different. In January, we predicted how the announcement of ChatGPT could change cybersecurity, and today, our predictions were validated again with the announcement of […]
The Pay Gap Isn’t The Only Problem For Women In CISO Roles
Last week, we published Forrester’s third CISO Career Paths report. This research involved an analysis of the career paths of Fortune 500 CISOs, looking into their education, tenures, and prior experiences of security leaders at some of the world’s largest companies. This data showcases existing trends and helps forecast what CISO roles will look like […]
Get A Head Start On The National Cybersecurity Strategy
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Introducing The Forrester Model To Defend Against Nation-State Threats
Given years of cyberespionage, attacks on elections, and, more recently, the melding of kinetic and digital warfare in the Russia-Ukraine war, private sector security leaders in all industries must recognize and prepare for more brazen and frequent nation-state cyberattacks. This is the first and the foundational report in a series that will help security leaders […]
Success With Zero Trust Lives And Dies By Executive Support
Forrester originated the Zero Trust Model over a decade ago and defines Zero Trust as: An information security model that denies access to applications and data by default. Threat prevention is achieved by only granting access to networks and workloads utilizing policy informed by continuous, contextual, risk-based verification across users and their associated devices. Zero Trust advocates […]
Cybersecurity Risk Dashboards: No Value, Extreme Liability
Over the last 12 months, “risk dashboards” became all the rage in cybersecurity, with varied titles such as “risk index,” “security baseline,” “security posture,” and “risk posture.” These dashboards appear in a vendor’s user interface and purport to help security programs improve. Some even offer coveted “benchmark data” that leaders can share with boards and […]
Announcing The Forrester Wave™: Security Analytics Platforms, Q4 2022
The security analytics platform market is moving faster than it has in years, as demonstrated by these Wave results. Though Splunk still has a tight grip on the segment, competitors are finding opportunities to loosen its hold by addressing continued dissatisfaction with outdated pricing models. Hyperscalers like Microsoft are establishing themselves as top competitors through […]
Uneven Innovation At AWS re:Invent 2022
Some 14 Forrester analysts attended this year’s AWS re:Invent in Las Vegas. The conference was a mix of innovation in some areas — particularly compute and networking, along with a co-engineering approach to industry cloud — but plateaus in others, such as hybrid and edge. Efficiency and consolidation were underlying themes, from amping up AI/ML […]
A Look Inside The Forrester-WISP Partnership: A Q&A With Rachel Tobac
The chair of the board at Women in Security and Privacy (WISP) discusses the organization's work and how companies can partner with it to foster diversity in cybersecurity.
Who You Gonna Call? Apply Your SOC Skills To Paranormal Investigations
Mischief, fright, haunting … These are just a few terms that apply to this time of year: Halloween. But these terms can also explain cyberattacks and the paranormal. Yes, we said it, cyberattacks and the paranormal, both things that go bump in the night (and often bump in the daylight, too). Both involve something that […]
The “Autonomous SOC” Is A Pipe Dream
Learn why an autonomous security operations center is an unrealistic vision for any security organization.
Apply Now For A Scholarship To Forrester’s Security And Risk Forum
A few weeks ago, I spoke with Derek Johnson from SC Media about my experiences early on in the security industry – good and bad. While some of these moments were difficult, all of them were formative and helped me better understand the current state of the security community and industry. We are blessed with […]
It’s Not You, It’s Them: Build A Resilient Cybersecurity Career
Preparing for the worst means putting loyalty aside to build a plan with your goals and growth at the center. Learn how to get started.
Forget Quiet Quitting — Tech Whistleblowers Go Out With A Bang
When tech companies select people with ideals and integrity, they get people with ideals and integrity. When they behave in ways that betray those employees, they can expect rebellion.
Five Reasons To Buy A Service Before A Product
Learn why moving away from legacy thinking on products and services leads to far better outcomes.
Threat Hunting 101: A Human-Led Exercise
Here, we clear up some misconceptions about threat hunting and explain why it’s in the best interest of your team to start doing it.
Five Straightforward Steps To Identify A Strong Product Vision
A security vendor's product vision can make or break client loyalty. Learn what to look for in evaluating vendors' product visions.
The Reaper Comes For Cyber Unicorns
While the economic downturn is in its early stages, it looks as though the hypergrowth phase of the cybersecurity vendor party has reached an abrupt end.
VMware Customers: Get Ready For Broadcom Disruption
Late Sunday evening, Bloomberg reported rumors of advanced Broadcom talks to acquire VMware, which has since been confirmed this morning. In light of Broadcom’s investment activities in the past few years, this news is unsurprising. It made a string of massively expensive enterprise software company acquisitions: Brocade Communications Systems in 2016 ($5.9 billion), CA Technologies […]
Planning Is Paramount When Adopting SOAR
To succeed with a security orchestration, automation, and response (SOAR) offering, outline how you'll use it first.