Jeff Pollard

VP, Principal Analyst

Forrester Bio

Author Insights

Blog

Beware Of “Coherent Nonsense” When Implementing Generative AI

Rowan Curran 1 day ago
Generative AI — using machine learning or other models (e.g., large language models) for creating novel text, images, sounds, etc. — is firmly in the spotlight as one of the fastest-developing areas of technology today, especially with the recent release of OpenAI’s ChatGPT. Over the past week, we’ve seen thousands of people experimenting with prompts […]
Blog

It’s Not You, It’s Them: Build A Resilient Cybersecurity Career

Jeff Pollard September 12, 2022
Preparing for the worst means putting loyalty aside to build a plan with your goals and growth at the center. Learn how to get started.
Blog

DuckDuckGo’s Email Protection: Another Strike Against The Surveillance Economy

Jess Burn August 31, 2022
Fresh off a yearlong beta test, DuckDuckGo moved its email protection service into an open beta. The service works across iOS and Android; browser extensions for Edge, Chrome, Firefox, and Brave; and DuckDuckGo for Mac. The service blocks trackers in emails, reducing the amount and type of data emails can send to third parties (like […]
Blog

Forget Quiet Quitting — Tech Whistleblowers Go Out With A Bang

Sara M. Watson August 26, 2022
When tech companies select people with ideals and integrity, they get people with ideals and integrity. When they behave in ways that betray those employees, they can expect rebellion.
Blog

Five Reasons To Buy A Service Before A Product

Jeff Pollard August 17, 2022
Learn why moving away from legacy thinking on products and services leads to far better outcomes.
Blog

Threat Hunting 101: A Human-Led Exercise

Jeff Pollard July 20, 2022
Here, we clear up some misconceptions about threat hunting and explain why it’s in the best interest of your team to start doing it.
Blog

Choose Apple Lockdown Mode, Choose Security

Paddy Harrington July 12, 2022
Users get to make their own choices about security and privacy when using Apple devices, not carriers, application developers, or advertisers.
Blog

If You Can Say It, You Can See It: Dall-E And You

William McKeon-White June 22, 2022
Or, “How a natural language image generation AI used as a meme generator by social media may impact your business.” Welcome To The Future — It’s Got AI-Generated Art Let’s play a quick game. Which of the below images were made by an AI system generating images based on word prompts? Let’s pretend you guessed […]
Blog

The Reaper Comes For Cyber Unicorns

Jeff Pollard June 13, 2022
While the economic downturn is in its early stages, it looks as though the hypergrowth phase of the cybersecurity vendor party has reached an abrupt end.
Blog

Microsoft Launches MDR And Hops On The Everything-As-A-Service Bandwagon

Jeff Pollard May 10, 2022
Everything-eventually-becomes-a-service which Microsoft demonstrates by launching its own version of managed detection & response. We discuss what CISOs need to know, how it will impact the market, and what to look for next.
Blog

Announcing Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX

Jeff Pollard April 18, 2022
The toughest battle SOC analysts face every day should not be with the technology they use. Analyst Experience (AX) will help solve that problem.
Blog

Our 2022 Top Recommendations For Your Security Program: CISOs Get An Offer They Can’t Refuse

Jeff Pollard April 6, 2022
The Coppola classic has a few surprising parallels with today's chief information security officer.
Blog

Neem de volgende stappen om u goed voor te bereiden op het cyberveiligheidseffect van de oorlog in Oekraïne

Paul McKay March 29, 2022
Neem de volgende stappen om u goed voor te bereiden op het cyberveiligheidseffect van de oorlog in Oekraïne
Blog

Mit diesen Schritten können Sie sich auf die Auswirkungen des Krieges in der Ukraine auf die Cybersicherheit vorbereiten und entsprechend handeln

Paul McKay 29 März 2022
11 Schritte, die Sie jetzt tun können, um Ihre Risiken und die Gefährdung durch Cyber-Bedrohungen im Zusammenhang mit dem Krieg zu verringern.
Blog

Mesures Pour Vous Préparer Et Gérer Les Effets Sur La Cybersécurité De La Guerre En Ukraine

Paul McKay 28 Mars 2022
Onze choses que vous pouvez faire maintenant pour réduire vos risques et votre exposition aux cybermenaces liées à la guerre.
Blog

Okta Lapsus$ Compromise: How To Make Sure You’re Protected

Merritt Maxim March 24, 2022
On Tuesday, March 22, 2022, identity-as-a-service (IDaaS) provider Okta announced that it had detected an attempt to compromise the account of a partner in January 2022. The announcement came after the hacking group Lapsus$ posted screenshots of a computer used by one of Okta’s third-party customer support engineers. As one of the largest IDaaS providers with […]
Blog

Nontraditional DDoS Attacks Are On The Rise

Heath Mullins March 10, 2022
If you have never heard of “DDoS amplification factor” prior to this week, you’re not alone. A new zero-day attack surfaced a vulnerability from an unlikely source: an internet-facing PBX (private branch exchange) system. Bad actors seized upon this opportunity to create a 4,294,967,296:1 amplification load. Yes, that’s 4 billion to one. This is a […]
Blog

Chronicles Of Mandiant: Google Put A Ring On It

Jeff Pollard March 8, 2022
Mandiant trades up from FireEye and finds a home within Google Cloud Platform.
Blog

Take These Steps To Prepare For And Handle The Cybersecurity Effects Of The War In Ukraine

Paul McKay February 28, 2022
Eleven things you can do now to reduce your risks and exposure to the cyber threats related to the war.
Blog

The Top Seven Most Misused Terms In Cybersecurity

Allie Mellen February 23, 2022
When vendors or practitioners use different words to communicate the same thing, confusion ensues. Let's take steps toward settling on a common vocabulary.
More posts