Madelein van der Hout
Senior Analyst
Author Insights
Blog
AWS Outage, Nexperia Seizure, And The EU’s Cloud Sovereignty Framework: The Battle For Digital Sovereignty Is On!
In times of calm, but especially in times of chaos, risk management strategies and their execution must be dictated by context and control. Prioritizing key risks and crafting appropriate responses is essential to keeping the business going. The battle for digital sovereignty is now unfolding in real time, following this exact script. Three Events Show […]
Blog
Announcing The Forrester Wave™: Cybersecurity Consulting Services In Europe, Q4 2025
European CISOs face rising regulatory demands, geopolitical instability, and rapid technological shifts. The Forrester Wave™: Cybersecurity Consulting Services In Europe, Q4 2025, captures a market in motion. Resilience now drives trust, AI amplifies capabilities, and data governance defines credibility. Our latest evaluation reveals the following market trends that European CISOs should consider when choosing their […]
Blog
The Netherlands Targets Chip Governance: A New Precedent For Cyber And IP Risk Intervention
The Netherlands placing Chinese-owned chipmaker Nexperia under ministerial oversight is a sign that Europe has crossed from passive screening to active control to keep IP and capacity in-region. Find out what this means for CISOs and risk leaders and what steps to take next.
Blog
Technology & Innovation Summit EMEA Review: Cyber Resilience In The Age Of Mayhem
In a time defined by AI-led disruption and economic volatility, innovation can feel as exhilarating as it is exhausting. Learn how to navigate the path to cyber resilience in an age of mayhem in this review of Forrester’s recent Technology & Innovation Summit EMEA.
Blog
Too Big To Fail, Cyber Edition
Why did the UK government extend a £1.5 billion guaranteed loan to Jaguar Land Rover after a debilitating ransomware attack? And what can your security team learn from it? Find out in this post.
Blog
The Global Digital Identity Waltz: Who Will Lead The Dance Of Trust?
Digital identity, once a dream for seamless global authentication and verification, now fragments along geopolitical fault lines. European companies are tightening ranks and forming alliances. China is sharpening its grip with a view to consumer protection and digital dominance. The US is retreating from federal coordination, citing risks from fraud and abuse. The battle for […]
Blog
Infosecurity Europe 2025, In Retro: 30 Years With No Goats
Infosecurity Europe celebrated its 30th anniversary at its 2025 edition in London, with 338 exhibitors and over 13,000 attendees.
Blog
RSAC 2025 Conference: An International Lens
A significant international presence at RSAC 2025 signaled the continued importance of the US as a global export platform for cybersecurity. Countries including Belgium, Canada, Germany, Ireland, Italy, the Netherlands, Saudi Arabia, Singapore, South Korea, Spain, and the UK showcased national pavilions and cybersecurity companies on the show floor, as well as organizing trade missions […]
Blog
Microsoft Races To Reassure Anxious Tech Execs In Europe
Increasing geopolitical volatility has characterized the last three years in Europe and is reaching new heights. Learn what Microsoft has committed to do and what tech executives should watch out for.
Blog
RSAC Conference 2025: Innovation Sandbox Turns 20
RSAC Conference 2025 featured the 20th annual Innovation Sandbox competition. Learn more about the entrants and results in this review of the event.
Blog
RSAC Conference 2025: Welcome To The Petting Zoo
From live goats and puppies to robot dogs and animal costumes, the RSAC Conference 2025 delivered some unexpected surprises. But it also delivered the usual insight into various trends in the security market today. Find out more in this RSAC review.
Blog
Overregulation Forges A CISO Coalition With The G7 Letter
A coalition of over 40 chief information security officers (CISOs) from leading companies, including Salesforce, Microsoft, AWS, Mastercard, and Siemens, sent a letter to the G7 and OECD, urging them to take action on aligning international cybersecurity regulations.
Blog
MITRE-geddon Averted, But Fragility In CVE Processes Remains
This week, we saw the CVE process, as we know it, come hours from the brink of collapse when a memo started circulating on LinkedIn that DHS would cut funding to MITRE’s CVE cataloging on April 16. MITRE’s role in the CVE process is the crucial first step in assigning IDs to vulnerabilities so that practitioners, vendors, researchers, and governments across the globe can consistently reference the same vulnerability. The process also allows for responsible disclosures and accountability for vulnerabilities to software companies.
Blog
The Tech Exec’s Guide To Decoding Cybersecurity Vendor Performance
Forrester analyzed the earnings calls of the 10 largest cybersecurity vendors by market cap and identified key trends for technology executives.
Blog
KubeCon 2025: Technology Resilience, Sovereignty, And Security In An Era Of Political Change
KubeCon + CloudNativeCon Europe 2025 in London underscored that the cloud-native ecosystem is operating within a complex and increasingly uncertain global landscape.
Blog
European Cybersecurity Reflections, 2024
Get reflections on the legislative trends, geopolitical tensions, and other changes that impacted CISOs in the European Union in 2024.
Blog
The API Security Software Landscape, Q3 2024
While API discovery and policy enforcement have gained traction, it's time for companies to elevate their approach to API security maturity. Learn how to get started in this preview of a new report.
Blog
Systemic Gaps And Geopolitical Tensions Define Europe’s Cybersecurity Threats In 2024
European businesses, much like their global counterparts, are caught in a delicate dance, with CISOs coping with sector-specific vulnerabilities, a regulatory maze, and geopolitical complexity. Forrester’s report, European Cybersecurity Threats, 2024, offers European security leaders some much-needed clarity. Security Fundamentals Matter More Than Security Theater Technology and security professionals often find themselves captivated by the […]
Blog
The CrowdStrike Moment Calls For A Redefinition Of Business Resilience
Crises such as the one triggered by CrowdStrike's global outage shine a bright light on many aspects of business and technology. Our new report provides a thorough overview of recommended actions for tech leaders as they face the unfolding long-term repercussions.
Blog
CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
More posts