Tope Olufon
Sr Analyst
Author Insights
Blog
AWS Outage, Nexperia Seizure, And The EU’s Cloud Sovereignty Framework: The Battle For Digital Sovereignty Is On!
In times of calm, but especially in times of chaos, risk management strategies and their execution must be dictated by context and control. Prioritizing key risks and crafting appropriate responses is essential to keeping the business going.
Blog
Declaring Zero Trust Without Testing Is A Lie
Zero Trust without real-world testing is a false sense of security. Learn how MITRE ATT&CK-driven adversarial trials turn Zero Trust from theory into proof.
Blog
How F5 And SonicWall Revealed The Fragility Of The Software Supply Chain
The recent breaches at F5 and SonicWall illustrate how attackers are targeting the very infrastructure that enterprises rely on to secure and deliver digital services.
Blog
The Netherlands Targets Chip Governance: A New Precedent For Cyber And IP Risk Intervention
The Netherlands placing Chinese-owned chipmaker Nexperia under ministerial oversight is a sign that Europe has crossed from passive screening to active control to keep IP and capacity in-region. Find out what this means for CISOs and risk leaders and what steps to take next.
Blog
Technology & Innovation Summit EMEA Review: Cyber Resilience In The Age Of Mayhem
In a time defined by AI-led disruption and economic volatility, innovation can feel as exhilarating as it is exhausting. Learn how to navigate the path to cyber resilience in an age of mayhem in this review of Forrester’s recent Technology & Innovation Summit EMEA.
Blog
Announcing My Latest Forrester Wave™ Covering Managed Detection And Response Services In Europe
The Forrester Wave™: Managed Detection And Response Services In Europe, Q3 2025, is live. It’s our second evaluation of the managed detection and response (MDR) space focused on the European market. It looks a bit different from our 2023 Wave, as European customers now place a greater emphasis on sovereignty, localization, speed, automation, and resilience. […]
Blog
Build Your Proactive Security Program By Matching Attacker Velocity
Effective security must mirror attacker agility. Learn how to think like an attacker and build a proactive security strategy in this preview of our upcoming Technology & Innovation Summit EMEA.
Blog
The Global Digital Identity Waltz: Who Will Lead The Dance Of Trust?
Digital identity, once a dream for seamless global authentication and verification, now fragments along geopolitical fault lines. European companies are tightening ranks and forming alliances. China is sharpening its grip with a view to consumer protection and digital dominance. The US is retreating from federal coordination, citing risks from fraud and abuse. The battle for […]
Blog
Your Zero Trust Strategy Needs An Adversarial Perspective
As IT environments become more complex and alert fatigue grows, the solution isn’t more controls — it’s systematic testing through an attacker’s lens. Find out how your Zero Trust strategy can benefit from this approach in this preview of a new report.
Blog
MITRE-geddon Averted, But Fragility In CVE Processes Remains
This week, we saw the CVE process, as we know it, come hours from the brink of collapse when a memo started circulating on LinkedIn that DHS would cut funding to MITRE’s CVE cataloging on April 16. MITRE’s role in the CVE process is the crucial first step in assigning IDs to vulnerabilities so that practitioners, vendors, researchers, and governments across the globe can consistently reference the same vulnerability. The process also allows for responsible disclosures and accountability for vulnerabilities to software companies.
Blog
European Cybersecurity Reflections, 2024
Get reflections on the legislative trends, geopolitical tensions, and other changes that impacted CISOs in the European Union in 2024.
Blog
European Digital Identity: Insights For The Bold And The Ambitious
In the grand tapestry of the European identity landscape, a new regulation — most audacious in its ambition — has emerged to enable digital identification across the continent.
Blog
Systemic Gaps And Geopolitical Tensions Define Europe’s Cybersecurity Threats In 2024
European businesses, much like their global counterparts, are caught in a delicate dance, with CISOs coping with sector-specific vulnerabilities, a regulatory maze, and geopolitical complexity. Forrester’s report, European Cybersecurity Threats, 2024, offers European security leaders some much-needed clarity. Security Fundamentals Matter More Than Security Theater Technology and security professionals often find themselves captivated by the […]
Blog
Erstellung einer Zero-Trust-Roadmap: Ein praktischer Leitfaden
Erfolgreiche Zero-Trust-Implementierungen müssen einige grundlegende organisatorische und technologische Probleme angehen, bevor sie ehrgeizige Transformationsprojekte in Angriff nehmen können. Lernen Sie drei häufige Probleme kennen, die Sie während Ihrer Zero Trust-Implementierung angehen müssen.
Blog
T&I Summit EMEA 2024: Staying Resilient In A Fluid Technology And Threat Landscape
“Resilience” is an oft-quoted and reasonable ideal that technology professionals and, by extension, the businesses they serve, strive for. But as anyone who works in the tech industry knows, our digital systems are often anything but, with security threats looming like the sword of Damocles. Business and technology leaders often manage risk by building systems […]
Blog
InfoSecurity Europe 2024: Next-Gen And AI Dominate The Show Floor
What will the short-term and the long-term impact of generative AI be on security? That was the big question at the recent InfoSecurity Europe 2024 event. Find out what we heard at the event in this blog and learn how to register for a deep-dive webinar next month.
Blog
InfoSec 2024: Balancing Opportunity Against Risks
Learn about a special event Forrester will be hosting at Infosecurity Europe 2024 which will provide insight into the unique cybersecurity challenges facing European businesses and help security leaders tailor their security strategies accordingly.
Blog
Building A Zero Trust Roadmap: A Practical Guide
Successful Zero Trust implementations have to tackle some fundamental organizational and technology problems before embarking on ambitious transformation projects. Learn three common problems you may need to address during your Zero Trust implementation journey.
Blog
Digital Trust Solutions Have Seen Increased Adoption And Innovation
The Digital Signature And Trust Solutions Landscape, Q1 2024, is live, reflecting our evaluation of key players and trends shaping the market. Vendors have demonstrated some curiosity and are tentatively exploring use cases more exciting than document signing. The European electronic identification scheme (eID) wallet has also created significant buzz, opening the door to new […]
Blog
European MDR Providers Differentiate With Superior Investigation And Response Skills
Find out how managed detection and response (MDR) providers have tailored their technical frameworks and service delivery methods in Europe to align with regional nuances.
More posts