Cybersecurity Trends

Stay up-to-date on the cutting edge of cybersecurity with insights on Zero Trust, vendors, regulations, and other privacy & security topics.

Insights

Blog

Did Our Predictions For 2022 Come True?

Sharyn Leaver 5 days ago
We made bold predictions for 2022. We weighed in on edge computing, CX, B2B marketing, cybersecurity, and more. Discover which predictions came true and which ones missed the mark as we prepare for Predictions 2023.
Blog

Apply Now For A Scholarship To Forrester’s Security And Risk Forum

Allie Mellen September 21, 2022
A few weeks ago, I spoke with Derek Johnson from SC Media about my experiences early on in the security industry – good and bad. While some of these moments were difficult, all of them were formative and helped me better understand the current state of the security community and industry. We are blessed with […]

Shape Your 2023 Cybersecurity Priorities For Uncertain Times

Join us for a planning webinar to learn how you can budget and align your 2023 cybersecurity plans for what’s ahead.

Blog

Apple’s BIMI Support = Time To Get Serious About DMARC Enforcement

Jess Burn September 19, 2022
Learn how Apple's latest announcement will make inboxes safer and what's required to reach DMARC enforcement.
Podcast

Succession Planning For The Security Org

What It Means September 15, 2022
Is overreliance on key security employees putting your entire organization at risk? Learn best practices for retention and succession planning in security from Senior Analyst Jess Burn.
Webinar

Shape Your 2023 Cybersecurity Priorities For Uncertain Times

As 2023 approaches, security leaders are hard at work planning for the cybersecurity trends headed our way – setting budgets, developing plans, and establishing priorities. Is your plan on track?
Blog

A Sneak Peek Into The Future Of Security Awareness And Training

Jinan Budge September 13, 2022
Forrester’s Guide To Global SA&T Regulations And Standards Reveals An Impetus For A Better Future Twenty-five percent of security decision-makers tell us that their security awareness and training (SA&T) programs are driven by compliance. A recent NIST study on “Measuring the Effectiveness of U.S. Government Security Awareness Programs” found that, among leadership, 56% of respondents […]
Blog

It’s Not You, It’s Them: Build A Resilient Cybersecurity Career

Jeff Pollard September 12, 2022
Preparing for the worst means putting loyalty aside to build a plan with your goals and growth at the center. Learn how to get started.

Connect With 21+ Security And Risk Analysts

Come to our Security & Risk Forum Nov. 8 – 9 for 25+ sessions 100% focused on threat mitigation strategies and insights.

Blog

For European Leaders, 2023 Planning Requires Discipline And Precision

Laura Koetzle September 6, 2022
As war, inflation, and fuel shortage fears cloud the near-term picture for businesses, being shrewd with investments and initiatives will be key.
Blog

DuckDuckGo’s Email Protection: Another Strike Against The Surveillance Economy

Jess Burn August 31, 2022
Fresh off a yearlong beta test, DuckDuckGo moved its email protection service into an open beta. The service works across iOS and Android; browser extensions for Edge, Chrome, Firefox, and Brave; and DuckDuckGo for Mac. The service blocks trackers in emails, reducing the amount and type of data emails can send to third parties (like […]
Blog

New Security & Risk Planning Guide Helps CISOs Set 2023 Priorities

Merritt Maxim August 23, 2022
Which security technologies should be getting the investment in 2023, and which ones should you be scaling back on? Find out in Forrester’s Planning Guide 2023: Security & Risk.
Blog

The Challenges With Securing The Anywhere-Work Endpoint

Paddy Harrington August 19, 2022
Learn how endpoint security has been impacted by the more to anywhere work and what steps security pros can take in this preview of the Security & Risk event.
Blog

Vulnerability Programs Must Regain Trust To Inspire Action

Erik Nost August 17, 2022
Is using CVSS scores for risk prioritization leading to misalignment and even mistrust in your organization? Find out in this Security & Risk event session preview.

Federal Zero Trust Or Bust?

Learn the three steps to federal Zero Trust compliance.

Blog

Five Reasons To Buy A Service Before A Product

Jeff Pollard August 17, 2022
Learn why moving away from legacy thinking on products and services leads to far better outcomes.
Blog

Perspectives From Black Hat 2022

Erik Nost August 16, 2022
Thousands of security practitioners, vendors, and researchers from 111 different countries packed the Mandalay Bay Convention Center in Las Vegas last week for the first in-person Black Hat since 2019. Since the 2019 Black Hat, new technologies and security providers have increased, but so have threats, actors, and social/political/economic concerns. This year’s high attendance demonstrated […]
Blog

US Federal Government Continues Cybersecurity Leadership With New OMB Memo

Heath Mullins July 29, 2022
The guidance in the new memorandum enables federal civilian agencies to properly assign cyber-initiative funding toward the most critical areas. Here, we take a closer look.
Blog

Threat Hunting 101: A Human-Led Exercise

Jeff Pollard July 20, 2022
Here, we clear up some misconceptions about threat hunting and explain why it’s in the best interest of your team to start doing it.
Blog

Choose Apple Lockdown Mode, Choose Security

Paddy Harrington July 12, 2022
Users get to make their own choices about security and privacy when using Apple devices, not carriers, application developers, or advertisers.

US Public Sector Predictions 2022

Discover how the President's Management Agenda will shape agencies' priorities in 2022.

Blog

NIST PQ: “Lattice” Pick A Winner

Sandy Carielli July 7, 2022
Last week, we wondered if early reports indicating that NIST would announce the winners of its post-quantum cryptography competition would come to fruition anytime soon. Happily, they have. After an evaluation process that began with a call for nominations in 2016 and culled dozens of potential post-quantum (PQ) cryptographic algorithms down to seven finalists and […]
Blog

Practice Empathy To Reduce Insider Risk

Joseph Blankenship June 15, 2022
Companies announcing layoffs need to pay attention to insider risk. Showing compassion and communicating openly can help.
Blog

The Reaper Comes For Cyber Unicorns

Jeff Pollard June 13, 2022
While the economic downturn is in its early stages, it looks as though the hypergrowth phase of the cybersecurity vendor party has reached an abrupt end.
More posts