Cybersecurity Trends

Stay up-to-date on the cutting edge of cybersecurity with insights on Zero Trust, vendors, regulations, and other privacy & security topics.

Insights

Blog

RSAC 2025 Conference: An International Lens

Paul McKay 1 day ago
A significant international presence at RSAC 2025 signaled the continued importance of the US as a global export platform for cybersecurity. Countries including Belgium, Canada, Germany, Ireland, Italy, the Netherlands, Saudi Arabia, Singapore, South Korea, Spain, and the UK showcased national pavilions and cybersecurity companies on the show floor, as well as organizing trade missions […]
Blog

Coinbase Flips The Coin On Would-Be Extortionists

Joseph Blankenship 4 days ago
In a recent example of why managing insider risk is critical, cryptocurrency exchange Coinbase announced that it was the target of an extortion scheme enabled by insiders. Learn more about the incident and how to protect against it in this blog.

Is Your Security Ready For Today’s Volatility?

Economic turmoil, cyberattacks, and rising regulations demand strong security leadership. Watch our webinar for tips on reducing risk, cutting costs, and leading through change.

Blog

The State Of Application Security, 2025: Yes, AI Just Made It Harder To Do This Right

Sandy Carielli 5 days ago
Our annual report on the state of application security is one of our favorites. We love digging into the data to see how priorities and adoption have changed. This year, the explosion of AI in applications and in-application development exacerbated existing trends and introduced new concerns. Here are some areas that got our attention. AI […]
Podcast

Temu On Tariffs, RSAC Review, SaaS Pricing Trends

What It Means 6 days ago
In this episode, we look at how one online retailer is working to minimize the impact of tariffs on its business, provide a review of a major cybersecurity conference, and highlight a new trend in software-as-a-service (SaaS) pricing.
Blog

It’s Time To Start Planning Your Postquantum Migration

Sandy Carielli May 12, 2025
When will quantum computers will be able to break asymmetric cryptography and algorithms? And what steps should you take to prepare? Find out in this preview of a report on quantum security.
Blog

RSAC Conference 2025: Innovation Sandbox Turns 20

Sandy Carielli May 7, 2025
RSAC Conference 2025 featured the 20th annual Innovation Sandbox competition. Learn more about the entrants and results in this review of the event.
Blog

RSAC Conference 2025: Welcome To The Petting Zoo

Sandy Carielli May 6, 2025
From live goats and puppies to robot dogs and animal costumes, the RSAC Conference 2025 delivered some unexpected surprises. But it also delivered the usual insight into various trends in the security market today. Find out more in this RSAC review.

Calm The Impact Of Volatility — And Thrive

Stay ahead of market volatility — be prepared, not reactive. Learn how to optimize costs, lead change, and mitigate risks with Forrester's report on navigating uncertainty and driving success in challenging times.

Webinar

Leading Through Volatility: Security And Risk Expert Panel

Master security risk management during volatility. Watch this webinar to explore the actions you can take to regain security control.
Blog

Don’t Call It A Comeback: Stay Ready For Ransomware

Jess Burn April 22, 2025
So far, 2025 is filled with … distractions for security leaders. Between scrambling to secure their organizations’ AI initiatives, staying on top of critical vulnerabilities (and the organizations delivering the CVE process), perpetually communicating and training to guard against human element breaches, and navigating yet another period of uncertainty and volatility, it’s tempting to take […]
Blog

MITRE-geddon Averted, But Fragility In CVE Processes Remains

Erik Nost April 18, 2025
This week, we saw the CVE process, as we know it, come hours from the brink of collapse when a memo started circulating on LinkedIn that DHS would cut funding to MITRE’s CVE cataloging on April 16. MITRE’s role in the CVE process is the crucial first step in assigning IDs to vulnerabilities so that practitioners, vendors, researchers, and governments across the globe can consistently reference the same vulnerability. The process also allows for responsible disclosures and accountability for vulnerabilities to software companies.
Blog

Government Leaders: Prioritize Cyber Efficiency Amid Federal Volatility

Cody Scott April 17, 2025
Government agencies at the federal, state, and local levels must prepare for a future where they experience uncertainty, headcount reductions, contract cancellations, and budget cuts. This is gut-wrenchingly difficult to process, yet remaining leaders must figure out how to move forward to serve the mission. For public sector cybersecurity leaders, this is even more paramount. […]
Blog

Forrester’s Top Threats For 2025

Allie Mellen April 16, 2025
2025 started with a bang! Technology and geopolitics are changing so fast that many can’t keep track of the latest trends, with an announcement of new, benchmark-shattering genAI-related tech seemingly every week.

Turn Uncertainty Into Opportunity

Market volatility isn’t a roadblock — it’s your launchpad. With Forrester’s expert resources, you can optimize costs, lead with confidence, and turn challenges into growth.

Blog

RSAC 2025 Early Stage Expo Preview: AppSec, IAM, GenAI, SecOps, And More

Heidi Shey April 8, 2025
As we put together our game plan for what to see at RSA Conference 2025, we wanted to scope out innovation, identify which vendor booths will be a must-see, and (at least for one of us) minimize the number of steps to take around the Moscone Center.
Blog

New Year, New Us: Introducing Forrester’s International Security & Risk Team Research

Jinan Budge April 7, 2025
Dive into our backgrounds, existing research, and capabilities. As a team, we cover a multitude of security and risk priorities. We are also geographically distributed; no one else is as uniquely positioned to add this level of global perspective to our research and our clients.
Blog

How CISOs Can Thrive Amid Economic Volatility

Jeff Pollard April 4, 2025
In today’s unpredictable economic climate, CISOs face familiar — but intensified — challenges. Get some actionable insights to help navigate through turbulent times in this preview of a new report.
Blog

Generative AI Innovation In Security Tools Is Finally Getting Interesting

Allie Mellen April 2, 2025
The core themes of The-C2 conference in London were artificial intelligence, supply chain security, and cyber hygiene. Get a closer look at how these themes may impact security professionals in this recap.
Blog

Address The Whole Person To Impact Insider Risk

Joseph Blankenship April 1, 2025
One of the main themes from the recent Insider Summit was that insider risk is very much a human problem, not a technology problem. Find out more in this review of the event.

Showcase Your Security & Risk Innovation With A Forrester Award

Get recognized for excellence in security, privacy, and risk innovation. Apply for a Forrester Security & Risk Enterprise Leadership Award to celebrate your success in creating resilient operations. Apply by July 23, 2025.

Blog

To Thrive Through Volatility, Master These Three Areas

Sharyn Leaver March 27, 2025
There’s no end in sight for the current disruption, but making the right strategic moves will help you come out ahead.
Blog

Top Recommendations For CISOs In 2025: Deal With Uncertainty … Again

Jeff Pollard March 12, 2025
The security landscape continues to evolve, as does global uncertainty, leaving CISOs preparing for turbulence ahead.
Blog

Cybersecurity’s Latest Buzzword Has Arrived: What Agentic AI Is And Isn’t

Allie Mellen March 12, 2025
As vendors come out of the woodwork announcing their “agentic AI” innovations, we explore what the term truly encompasses and what is hype.
More posts