Allie Mellen

Senior Analyst

Forrester Bio

Author Insights

Blog

A Look Inside The Forrester-WISP Partnership: A Q&A With Rachel Tobac

Allie Mellen 1 day ago
The chair of the board at Women in Security and Privacy (WISP) discusses the organization's work and how companies can partner with it to foster diversity in cybersecurity.
Blog

Who You Gonna Call? Apply Your SOC Skills To Paranormal Investigations

Allie Mellen October 31, 2022
Mischief, fright, haunting … These are just a few terms that apply to this time of year: Halloween. But these terms can also explain cyberattacks and the paranormal. Yes, we said it, cyberattacks and the paranormal, both things that go bump in the night (and often bump in the daylight, too). Both involve something that […]
Blog

The “Autonomous SOC” Is A Pipe Dream

Allie Mellen October 26, 2022
Learn why an autonomous security operations center is an unrealistic vision for any security organization.
Blog

Apply Now For A Scholarship To Forrester’s Security And Risk Forum

Allie Mellen September 21, 2022
A few weeks ago, I spoke with Derek Johnson from SC Media about my experiences early on in the security industry – good and bad. While some of these moments were difficult, all of them were formative and helped me better understand the current state of the security community and industry. We are blessed with […]
Blog

It’s Not You, It’s Them: Build A Resilient Cybersecurity Career

Jeff Pollard September 12, 2022
Preparing for the worst means putting loyalty aside to build a plan with your goals and growth at the center. Learn how to get started.
Blog

Forget Quiet Quitting — Tech Whistleblowers Go Out With A Bang

Sara M. Watson August 26, 2022
When tech companies select people with ideals and integrity, they get people with ideals and integrity. When they behave in ways that betray those employees, they can expect rebellion.
Blog

Five Reasons To Buy A Service Before A Product

Jeff Pollard August 17, 2022
Learn why moving away from legacy thinking on products and services leads to far better outcomes.
Blog

Threat Hunting 101: A Human-Led Exercise

Jeff Pollard July 20, 2022
Here, we clear up some misconceptions about threat hunting and explain why it’s in the best interest of your team to start doing it.
Blog

Five Straightforward Steps To Identify A Strong Product Vision

Allie Mellen July 12, 2022
A security vendor's product vision can make or break client loyalty. Learn what to look for in evaluating vendors' product visions.
Blog

The Reaper Comes For Cyber Unicorns

Jeff Pollard June 13, 2022
While the economic downturn is in its early stages, it looks as though the hypergrowth phase of the cybersecurity vendor party has reached an abrupt end.
Blog

VMware Customers: Get Ready For Broadcom Disruption

Tracy Woo May 26, 2022
Late Sunday evening, Bloomberg reported rumors of advanced Broadcom talks to acquire VMware, which has since been confirmed this morning. In light of Broadcom’s investment activities in the past few years, this news is unsurprising. It made a string of massively expensive enterprise software company acquisitions: Brocade Communications Systems in 2016 ($5.9 billion), CA Technologies […]
Blog

Planning Is Paramount When Adopting SOAR

Allie Mellen May 25, 2022
To succeed with a security orchestration, automation, and response (SOAR) offering, outline how you'll use it first.
Blog

Microsoft Launches MDR And Hops On The Everything-As-A-Service Bandwagon

Jeff Pollard May 10, 2022
Everything-eventually-becomes-a-service which Microsoft demonstrates by launching its own version of managed detection & response. We discuss what CISOs need to know, how it will impact the market, and what to look for next.
Blog

MITRE ATT&CK Evals: Getting 100% Coverage Is Not As Great As Your Vendor Says It Is

Allie Mellen April 25, 2022
The MITRE Engenuity ATT&CK Evaluations team announced the results of its most recent evaluation of enterprise security solutions, and I immediately started digging into the data for insights for security pros. The MITRE Engenuity team is very careful to avoid any rankings or scores as part of the evaluation process, though some may see not […]
Blog

Announcing Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX

Jeff Pollard April 18, 2022
The toughest battle SOC analysts face every day should not be with the technology they use. Analyst Experience (AX) will help solve that problem.
Blog

Breaches By The Numbers: Adapting To Regional Challenges Is Imperative

Allie Mellen April 12, 2022
Nearly two-thirds of organizations were breached in the past year, and it cost them an average of $2.4 million per breach. Our recent survey results dive into these and other findings.
Blog

Announcing The Forrester EDR Wave™: Advanced Features Are Left Behind In The Rush To XDR

Allie Mellen April 6, 2022
We are thrilled to announce the release of The Forrester Wave™: Endpoint Detection And Response Providers, Q2 2022. This Forrester Wave evaluated 15 different endpoint detection and response (EDR) providers, including Bitdefender, BlackBerry Cylance, Check Point Software Technologies, CrowdStrike, Cybereason, Elastic, FireEye, Fortinet, McAfee, Microsoft, Palo Alto Networks, SentinelOne, Sophos, Trend Micro, and VMware Carbon […]
Blog

So aktualisieren Sie Ihr Risikomanagement angesichts des Krieges in der Ukraine

Alla Valente 30 März 2022
Führende Risikomanagementunternehmen in Europa und weltweit sind bereits vom Krieg in der Ukraine und den gegen russische und weißrussische Akteure verhängten Sanktionen betroffen. Forrester-Analysten geben in diesem Beitrag ihre Einschätzung.
Blog

Neem de volgende stappen om u goed voor te bereiden op het cyberveiligheidseffect van de oorlog in Oekraïne

Paul McKay March 29, 2022
Neem de volgende stappen om u goed voor te bereiden op het cyberveiligheidseffect van de oorlog in Oekraïne
Blog

Mit diesen Schritten können Sie sich auf die Auswirkungen des Krieges in der Ukraine auf die Cybersicherheit vorbereiten und entsprechend handeln

Paul McKay 29 März 2022
11 Schritte, die Sie jetzt tun können, um Ihre Risiken und die Gefährdung durch Cyber-Bedrohungen im Zusammenhang mit dem Krieg zu verringern.
More posts