Allie Mellen

Analyst

Forrester Bio

Author Insights

Blog

The Reaper Comes For Cyber Unicorns

Jeff Pollard June 13, 2022
While the economic downturn is in its early stages, it looks as though the hypergrowth phase of the cybersecurity vendor party has reached an abrupt end.
Blog

VMware Customers: Get Ready For Broadcom Disruption

Tracy Woo May 26, 2022
Late Sunday evening, Bloomberg reported rumors of advanced Broadcom talks to acquire VMware, which has since been confirmed this morning. In light of Broadcom’s investment activities in the past few years, this news is unsurprising. It made a string of massively expensive enterprise software company acquisitions: Brocade Communications Systems in 2016 ($5.9 billion), CA Technologies […]
Blog

Planning Is Paramount When Adopting SOAR

Allie Mellen May 25, 2022
To succeed with a security orchestration, automation, and response (SOAR) offering, outline how you'll use it first.
Blog

Microsoft Launches MDR And Hops On The Everything-As-A-Service Bandwagon

Jeff Pollard May 10, 2022
Everything-eventually-becomes-a-service which Microsoft demonstrates by launching its own version of managed detection & response. We discuss what CISOs need to know, how it will impact the market, and what to look for next.
Blog

MITRE ATT&CK Evals: Getting 100% Coverage Is Not As Great As Your Vendor Says It Is

Allie Mellen April 25, 2022
The MITRE Engenuity ATT&CK Evaluations team announced the results of its most recent evaluation of enterprise security solutions, and I immediately started digging into the data for insights for security pros. The MITRE Engenuity team is very careful to avoid any rankings or scores as part of the evaluation process, though some may see not […]
Blog

Announcing Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX

Jeff Pollard April 18, 2022
The toughest battle SOC analysts face every day should not be with the technology they use. Analyst Experience (AX) will help solve that problem.
Blog

Breaches By The Numbers: Adapting To Regional Challenges Is Imperative

Allie Mellen April 12, 2022
Nearly two-thirds of organizations were breached in the past year, and it cost them an average of $2.4 million per breach. Our recent survey results dive into these and other findings.
Blog

Announcing The Forrester EDR Wave™: Advanced Features Are Left Behind In The Rush To XDR

Allie Mellen April 6, 2022
We are thrilled to announce the release of The Forrester Wave™: Endpoint Detection And Response Providers, Q2 2022. This Forrester Wave evaluated 15 different endpoint detection and response (EDR) providers, including Bitdefender, BlackBerry Cylance, Check Point Software Technologies, CrowdStrike, Cybereason, Elastic, FireEye, Fortinet, McAfee, Microsoft, Palo Alto Networks, SentinelOne, Sophos, Trend Micro, and VMware Carbon […]
Blog

So aktualisieren Sie Ihr Risikomanagement angesichts des Krieges in der Ukraine

Alla Valente 30 März 2022
Führende Risikomanagementunternehmen in Europa und weltweit sind bereits vom Krieg in der Ukraine und den gegen russische und weißrussische Akteure verhängten Sanktionen betroffen. Forrester-Analysten geben in diesem Beitrag ihre Einschätzung.
Blog

Neem de volgende stappen om u goed voor te bereiden op het cyberveiligheidseffect van de oorlog in Oekraïne

Paul McKay March 29, 2022
Neem de volgende stappen om u goed voor te bereiden op het cyberveiligheidseffect van de oorlog in Oekraïne
Blog

Mit diesen Schritten können Sie sich auf die Auswirkungen des Krieges in der Ukraine auf die Cybersicherheit vorbereiten und entsprechend handeln

Paul McKay 29 März 2022
11 Schritte, die Sie jetzt tun können, um Ihre Risiken und die Gefährdung durch Cyber-Bedrohungen im Zusammenhang mit dem Krieg zu verringern.
Blog

The Security Analyst: An Expert In A Beginner’s Clothing

Allie Mellen March 29, 2022
An entry-level cybersecurity role has requirements much closer to an intermediate one, our research shows. What else should security leaders keep in mind to attract the right candidates?
Blog

Comment Mettre À Jour Votre Stratégie De Gestion Des Risques Face À La Guerre En Ukraine

Alla Valente 28 Mars 2022
Les leaders de la gestion des risques en Europe et dans le monde sont déjà impactés par la guerre en Ukraine et les sanctions imposées aux acteurs russes et biélorusses. Les analystes de Forrester fournissent leurs conseils dans cet article.
Blog

Mesures Pour Vous Préparer Et Gérer Les Effets Sur La Cybersécurité De La Guerre En Ukraine

Paul McKay 28 Mars 2022
Onze choses que vous pouvez faire maintenant pour réduire vos risques et votre exposition aux cybermenaces liées à la guerre.
Blog

Nontraditional DDoS Attacks Are On The Rise

Heath Mullins March 10, 2022
If you have never heard of “DDoS amplification factor” prior to this week, you’re not alone. A new zero-day attack surfaced a vulnerability from an unlikely source: an internet-facing PBX (private branch exchange) system. Bad actors seized upon this opportunity to create a 4,294,967,296:1 amplification load. Yes, that’s 4 billion to one. This is a […]
Blog

Chronicles Of Mandiant: Google Put A Ring On It

Jeff Pollard March 8, 2022
Mandiant trades up from FireEye and finds a home within Google Cloud Platform.
Blog

Fix The Vulnerability Within: Break Gender Bias In Cybersecurity

Jinan Budge March 7, 2022
Forrester predicts that in 2022, one in 10 experienced security pros will exit the industry. This brain drain is the result of a few dynamics colliding: poor financial and advancement incentives; general stress and burnout impacting security teams; and cybersecurity’s dirty little secret, workplace toxicity! And cybersecurity isn’t immune to the hidden epidemic impacting women’s ability […]
Blog

Here’s How To Update Your Risk Management Posture Given The War In Ukraine

Alla Valente February 28, 2022
Risk management leaders in Europe and worldwide are already being impacted by the war in Ukraine and the sanctions imposed on Russian and Belarusian actors. Forrester analysts provide their guidance in this post.
Blog

Take These Steps To Prepare For And Handle The Cybersecurity Effects Of The War In Ukraine

Paul McKay February 28, 2022
Eleven things you can do now to reduce your risks and exposure to the cyber threats related to the war.
Blog

The Top Seven Most Misused Terms In Cybersecurity

Allie Mellen February 23, 2022
When vendors or practitioners use different words to communicate the same thing, confusion ensues. Let's take steps toward settling on a common vocabulary.
More posts