CISO Trends
The chief information security officer (CISO) role is growing in importance and remit. Discover the latest trends and analysis for CISOs and information security leaders.
Insights
Blog
Choose Your Own MDR Adventure: Avoid The Free-For-All Of “New” MDR Services
Managed detection and response (MDR) — without a doubt — has successfully claimed the crown of all managed security services for making and keeping clients happy.
Blog
AI And ML Security: Preventing Jailbreaks, Drop Tables, And Data Poisoning
Get a simplified view of the the top three generative AI use cases that security leaders need to worry about and get recommendations for prioritizing them.
Missed It? Watch The APAC Predictions Webinar Replay
Watch it now to explore the 2025 tech predictions impacting APAC tech leaders. Learn what this research means for tech and security strategies in the Asia Pacific region.
Blog
Tenable To Acquire Vulcan Cyber: More Consolidation In The Vulnerability Management Market
The proactive security market is consolidating further as exposure management vendor Tenable announced its intent to acquire Vulcan Cyber, a unified vulnerability management (UVM) vendor that specializes in third-party vulnerability collection, vulnerability response, and application security posture management. This acquisition demonstrates how vendors are reacting to CISOs’ continued need to unify and consolidate their fragmented […]
Blog
Breaking Down Human-Element Breaches To Improve Cybersecurity: FAQ
We are thrilled to announce our new research report, Deconstructing Human-Element Breaches, detailing the many and varied risks posed by and to humans — a problem that has plagued cybersecurity teams for decades. Forrester clients can use this research as a catalyst for productive conversations with executives and peers across functions about controls to mitigate the human-element breach types most common to their organizations and industries.
Blog
NetApp Focuses On Storage And Exits FinOps
Last week, Flexera announced intent to acquire Spot by NetApp to the tune of $100 million, a considerable drop from the $450 million that NetApp paid to acquire Spot.
Podcast
Encore Presentation: How Should Business And Tech Leaders Spend In 2025?
Business and tech leaders expect (slightly) bigger budgets this year. How should they use them? On this episode of What It Means, VPs and Group Research Directors Stephanie Balaouras, Keith Johnston, and Srividya Sridharan dive into Forrester’s Budget Planning Guides’ recommendations for tech, marketing and sales, and customer experience (CX) leaders.
Blog
OpenAI’s o3: Hype Or A Real Step Toward AGI?
OpenAI’s new o3 and o3-mini models are generating excitement with claims of advanced reasoning capabilities, fueling the artificial general intelligence debate. Learn more about the opportunities and challenges of these models for organizations looking to get more impact from AI.
Blog
European Cybersecurity Reflections, 2024
Get reflections on the legislative trends, geopolitical tensions, and other changes that impacted CISOs in the European Union in 2024.
Blog
Your Car Is Listening To You — And So Are Hackers
Skoda and Volkswagen are the latest vehicle manufacturers that have had vulnerabilities discovered in their cars that could allow malicious actors to execute code remotely. Find out more about privacy risks in cars and what can be done to minimize them.
Blog
Three Things To Know About How Security Team Toxicity Can Increase Breach Risk
New research finds that engaged, healthy, psychologically safe, and collaborative security teams experience fewer breaches. Find out why.
Blog
What We Saw At AWS re:Invent 2024
AWS may have been caught off guard by the sudden rise of generative AI, but now it’s coming for the competition from every possible angle. Get our key takeaways from AWS re:Invent 2024.
Blog
Warning: The Mobile Endpoint In Your Pocket May Be Just As Vulnerable As Your Desktop
Learn why the Android OS can be just as vulnerable to attacks as Windows and what steps you can take to minimize the risk.
Blog
Stop Defending The Three Lines Of Defense
Learn how the Forrester Continuous Risk Management Model can replace outdated risk management methods in this preview of a session at the upcoming Security & Risk Summit.
Blog
CrowdStrike Acquires SaaS Security Specialist Adaptive Shield
Cybersecurity platform provider CrowdStrike announced plans to acquire Adaptive Shield, a SaaS security posture management (SSPM) vendor. Some sources reported the purchase price to be around $300 million. If that purchase price is accurate, based on Forrester’s estimates of Adaptive Shield’s current revenue, that price represents an approximately 12–15x revenue multiplier and 6 times more […]
Blog
If You’re Not Using Data Pipeline Management For Security And IT, You Need To
Data ingestion into security information and event management (SIEM) have been too expensive for too long. Find out what's driving up the cost and how to manage it better in this post.
Blog
IATA’s Distributed Digital Identity Framework Serves A Compelling Business Need
The International Air Transport Association (IATA) — the trade association for world airlines, representing over 330 airlines and over 80% of global air traffic — announced a new framework and plans for using decentralized digital identity (DDID) to provide end-to-end travel experiences for domestic and international passengers.
Blog
The API Security Software Landscape, Q3 2024
While API discovery and policy enforcement have gained traction, it's time for companies to elevate their approach to API security maturity. Learn how to get started in this preview of a new report.
2025 Tech Predictions: Your Must-Have Guide
From AI’s impact to cloud evolution and smarter workflows for the SDLC and AIOps, 2025 is set to be a big year for tech. Download our Predictions guide to see if you’re on track to make the most of these changes.
Webinar
Predictions 2025 Webinar: Technology & Security
Find out where AI, cloud, and infrastructure are headed in 2025 by watching the on-demand replay of our 2025 predictions for technology and security.
Blog
Predictions 2025: Hard-Won Insights Drive Growth
Business focus is shifting from experimentation to bottom-line gains. Our Predictions 2025 resources reveal what’s next for your industry and role — and the moves that will set you up for competitive advantage.
Podcast
A Fresh Look At The Future Of The CISO
The role of the chief information security officer (CISO) is more vital than ever. But how are CISOs holding up under the spotlight, and how is the role changing? VP and Principal Analyst Jeff Pollard and Principal Analyst Jess Burn share some new research on the future of the CISO.
More posts