Jeff Pollard
VP, Principal Analyst
![](https://go.forrester.com/wp-content/uploads/2022/09/Jeff-Pollard-640x480.jpg)
Author Insights
Blog
The CrowdStrike Moment Calls For A Redefinition Of Business Resilience
Crises such as the one triggered by CrowdStrike's global outage shine a bright light on many aspects of business and technology. Our new report provides a thorough overview of recommended actions for tech leaders as they face the unfolding long-term repercussions.
Blog
CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog
What We Can Learn From 2023’s Most Notable Breaches
Cybersecurity breaches continued to rise in 2023. Learn the eight most common incident types and get four key takeaways from our new report.
Blog
Cloud Detection And Response Tools Do Not Exist
Cloud detection and response is not a market category — it is a feature of existing cloud tools. Get a formal definition and more in this post previewing a new report.
Blog
The State Of Cybersecurity Innovation: RSA Conference 2024
RSAC gives security startups two structured opportunities to distinguish themselves, and Forrester always finds it revealing to see which startups make the cut.
Blog
IBM Surrenders SIEM While PANW Tries To Gain Ground On Tech Titans
Find out what Palo Alto Networks' acquisition of IBM’s QRadar business means for the broader security information and event management SIEM market.
Blog
Forrester’s RSAC 2024 Themes, Takeaways, And Observations
More than 41,000 attendees, 600 exhibitors, and 425 sessions. Get some of the key themes and takeaways from the Forrester security & risk analysts who attended RSA Conference (RSAC) 2024.
Blog
Choosing The Best Security Conferences For Your Team
Struggling to decide which security conferences to attend? To help you make an informed choice as conference season approaches, Forrester analyzed the content of eight leading security conferences from 2018 to 2023. Get a preview of that analysis here.
Blog
Get Ready For Takeoff: Microsoft Copilot For Security
Microsoft announced the launch date of Copilot for Security. Find out what this means for security professionals and how you can prepare.
Blog
2024 Security Recommendations: Tackle Change Head On
Changing tech, changing threats, and changing consequences. 2024 will be a busy year for security professionals. Get a preview of our top security recommendations for 2024 in this blog and then read our full report.
Blog
Breaking Down The US Executive Order To Protect Americans’ Sensitive Personal Data
Learn the key takeaways and market impacts from the Biden administration’s executive order to protect Americans’ sensitive personal data.
Blog
Prescription For Change: Cybersecurity Outage Highlights Critical Vulnerabilities In Healthcare
A recent cybersecurity incident at Change Healthcare cause the pharmacy claims processors to take its systems offline. Learn the implication of this event and five things firms can do to prepare.
Blog
Biden’s Executive Order On AI Is Broad In Scope And Laser-Focused On Spurring Innovation Without Undue Risk
The new executive order calls for a “societywide effort” from government, the private sector, academia, and civil society to address eight AI priorities.
Blog
Forget Ghost Stories: CISOs Should Be Scared Of The SEC
The SEC plans to haunt CISOs with cybersecurity enforcement, but there might be a silver lining for CISOs in the SEC complaint.
Blog
The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.
Blog
Prevent Data Turnovers With Insider Risk Management
Learn some valuable lessons about insider risk management from the New York Knicks and the Toronto Raptors. Really.
Blog
2003 Called, And It Doesn’t Want Its Email Security Appliances Back
Email security appliances have come a long way in the past 20 years. Learn the benefits of cloud-delivered email security.
Blog
Black Hat USA 2023: Insights From Our Short Vegas Residency
Black Hat USA 2023: Insights From Our Short Vegas Residency Black Hat has gone from being RSAC’s smaller tech and practitioner-focused cousin to being a commercial showcase for cybersecurity vendors. A tightly packed, noisy Business Hall included over 300 vendors and 400 organizations with booths, which was great for swag but bad for anyone with […]
Blog
Making Reality Unreal: Five Deepfake Scams That Imperil Enterprises In 2023
While it might seem like generative AI is the only use case for AI around today, just a few years ago, deepfakes wore the mantle for attention and hype in the AI universe. That’s fallen off considerably today, but we will likely see a resurgence in interest based on attacks using deepfakes to scam and […]
Blog
Introducing Detection Surface, The Cybersecurity Defense That Parallels Attack Surface
On traditional infrastructure (laptops, servers, workstations, on-premises network infrastructure), the attack surface was the closest match to true perimeter-based defense we could get. The network infrastructure gave access to the systems within (crunchy outside; gooey, cubicle, khakis, and blue button-downs inside). As such, detection of attacker activity was relegated to network-based activity, endpoint-based activity, and […]
More posts