Cybersecurity Trends

Stay up-to-date on the cutting edge of cybersecurity with insights on Zero Trust, vendors, regulations, and other privacy & security topics.

Insights

Blog

The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep

Paddy Harrington 2 days ago
News has been trickling out since August 20 about a security issue in Salesloft’s Drift product, a marketing and sales chatbot that integrates with CRM systems to capture and track sales opportunities. The issue started in March, when threat actors accessed Salesloft’s GitHub account and did reconnaissance, which helped them access Drift’s AWS environment and […]
Blog

Partner For Progress: Security And HR Must Team Up For Insider Risk Management

Joseph Blankenship 6 days ago
Since insider risk is more about people than PCs, security and insider risk management pros must make an unlikely new ally: their colleagues in HR. Find out how HR can help reduce insider risk in this preview of our upcoming Security & Risk Summit.

Master Risk And Lead Through Uncertainty

Attend our Security & Risk Summit to get insider access to frameworks and tools that help security professionals navigate AI attacks, understand quantum risks, and redefine resilience.

Blog

Announcing My Latest Forrester Wave™ Covering Managed Detection And Response Services In Europe

Tope Olufon September 4, 2025
The Forrester Wave™: Managed Detection And Response Services In Europe, Q3 2025, is live. It’s our second evaluation of the managed detection and response (MDR) space focused on the European market. It looks a bit different from our 2023 Wave, as European customers now place a greater emphasis on sovereignty, localization, speed, automation, and resilience. […]
Blog

Vibe Hacking And No-Code Ransomware: AI’s Dark Side Is Here

Jeff Pollard August 28, 2025
CISOs must recognize that AI is enabling attackers to scale operations quickly with minimal technical skill. Learn how this is happening and get four key takeaways to better defend your organization in this new era.
Blog

Lessons From Technology & Innovation Summit APAC’s Forrester Women’s Leadership Program: Choose Your Advisors, And Nuggets Of Advice, Wisely

Jinan Budge August 27, 2025
A room full of people gathered as part of our Forrester Women’s Leadership Program to celebrate successes and posit solutions for the many challenges that women face in this field. The theme? “Choose your advisors — and nuggets of advice — wisely.”
Webinar

Virtual Roundtable: Forrester’s Technology & Security Summit Sneak Peek

Join Forrester’s analysts for an exclusive virtual roundtable. You’ll get a first look at the insights behind our upcoming Technology & Innovation and Security & Risk Summits—plus a chance to engage directly with experts and peers in a small-group setting.
Blog

Ongoing Government Uncertainty Around Cybersecurity Initiatives Is Putting Your Business At Risk

Paddy Harrington August 20, 2025
Government instability is undermining key cybersecurity programs like CyberSentry and MITRE’s CVE cataloging, putting critical infrastructure and business operations at risk. This post explores how funding cuts and conflicting AI directives are creating dangerous gaps in threat detection and response.
Blog

Black Hat 2025: Troop Forrester Goes To Hacker Summer Camp

James Plouffe August 13, 2025
2025 marks the 28th year of Black Hat, and although it remains on the edgier side of corporate-focused cybersecurity conferences, it sometimes feels like the event is considering completely ditching its hoodie in favor of a collared shirt.
Blog

Navigating Cyber Regulatory Purgatory Using AI

Paul McKay August 12, 2025
As cyber regulations continue to multiply, cyber and risk professionals need to make choices about how they comply with cyber regulations that conflict with each other. Find out how generative AI can help in this preview of our upcoming Security & Risk Summit.
Blog

Human Risk Management: From Talk To Action In 18 Months

Jinan Budge August 12, 2025
Since its launch, human risk management has blossomed into a distinct and expanding market, attracting the interest and budget of many organizations. Learn about the fast evolution of HRM in this preview of our upcoming Security & Risk Summit.
Blog

Quantum Security: Three Questions State And Local Government Leaders Must Ask Themselves TODAY

Sandy Carielli August 7, 2025
If you are a security or technology leader in state or local government, you might be looking at the influx of quantum security readiness guidelines with trepidation. Ask yourself and your team these three questions to figure out what to do next.
Blog

Introducing AEGIS — The Guardrails That CISOs Need For The Agentic Enterprise

Jeff Pollard August 4, 2025
AI agents aren’t coming — they’re already here. And they’re not waiting for your security architecture to catch up. Learn how Forrester's new AEGIS framework can help CISOs secure, govern, and manage AI agents and agentic infrastructure.

New For 2026! Security Budget Planning Guide + Workbook

Prepare your 2026 security budget for critical risks. Get our budget planning guide and workbook to assess, prioritize, and implement investments for fortified security in uncertain times.

Blog

Master Risk And Conquer Chaos At Forrester’s Security & Risk Summit

Amy DeMartine July 31, 2025
For leaders in security, risk, and privacy, this year has been different, with a new level of volatility fueled by geopolitics, new regulatory hurdles, relentless AI disruption, and looming quantum threats. Learn how Forrester’s Security & Risk Summit 2025 can empower you to stay ahead of the chaos, take the right risks, and secure your organization.
Blog

Palo Alto Networks Enters The Identity Security Market With $25B Purchase Of CyberArk

Allie Mellen July 31, 2025
The third-largest cybersecurity M&A deal in history makes sense in some respects, but the track record on mega security and identity tie-ups is incomplete and unproven.
Blog

Academic Freedom And Security: What Hogwarts Can Teach Us About Cybersecurity In Education

Carlos Rivera July 23, 2025
As educational institutions become increasingly connected, the need for robust cybersecurity grows even greater. Learn how we can protect digital campuses without building walls so high that curiosity can’t climb over them.
Blog

Drowning In Security Data Costs? You Get A Data Lake

Allie Mellen July 22, 2025
A common client request I’ve gotten over the past several years is how to best manage growing data costs in the security information and event management (SIEM) system.
Blog

MCP Doesn’t Stand For “Many Critical Problems” … But Maybe It Should For CISOs

Jeff Pollard July 22, 2025
As autonomous agents evolve from novelty to necessity, the protocols that govern their behavior become critical infrastructure. This blog explores the foundational tools we need to build a trustworthy agentic future.
Blog

Build Your Proactive Security Program By Matching Attacker Velocity

Tope Olufon July 17, 2025
Effective security must mirror attacker agility. Learn how to think like an attacker and build a proactive security strategy in this preview of our upcoming Technology & Innovation Summit EMEA.
Blog

Security Planning 2026: Budget To Manage Volatility, Seize Opportunities, And Avoid Threats

Jess Burn July 15, 2025
Security and risk leaders face an uncertain road ahead in 2026. Wild market swings, geopolitical tensions, and increased cybersecurity threats mean that security and risk leaders must build resilient plans and make bold moves to turn volatility into opportunity. Learn how our Budget Planning Guide for security and risk leaders can help.
Blog

Announcing The Forrester Wave™: Zero Trust Platforms, Q3 2025 — Choosing A Platform Solution For Your Zero Trust Journey

Carlos Rivera July 10, 2025
The latest edition of our Zero Trust platform vendor evaluation, The Forrester Wave™: Zero Trust Platforms, Q3 2025, published today. It highlights how this market continues to improve upon delivering unified solutions that help simplify and operationalize Zero Trust for organizations. Beginning with The Zero Trust Platforms Landscape, Q1 2025, we researched major players in […]
More posts