data security

Data fuels business success. Poor data security can spell business failure. Read our insights on data security trends, best practices, and more.

Discover how Forrester supports technology executives.

Insights

Blog

It’s Time To Start Planning Your Postquantum Migration

Sandy Carielli 1 day ago
When will quantum computers will be able to break asymmetric cryptography and algorithms? And what steps should you take to prepare? Find out in this preview of a report on quantum security.
Blog

Tackling Cloud Security: US Federal Edition

Andras Cser 7 days ago
Back in 2007, the first US federal CIO, Vivek Kundra, was appointed. Shortly after in December of 2010, he launched one of the world’s first “cloud-first” initiatives, making many US federal agencies such as the General Services Administration (GSA) some of the earlier innovators in this arena.

Is Your Security Ready For Today’s Volatility?

Economic turmoil, cyberattacks, and rising regulations demand strong security leadership. Watch our webinar for tips on reducing risk, cutting costs, and leading through change.

Blog

RSAC Conference 2025: Welcome To The Petting Zoo

Sandy Carielli May 6, 2025
From live goats and puppies to robot dogs and animal costumes, the RSAC Conference 2025 delivered some unexpected surprises. But it also delivered the usual insight into various trends in the security market today. Find out more in this RSAC review.
Blog

Global Tariffs: Dynamic Risk Management Meets Its Moment

Paul McKay April 23, 2025
The recent introduction of US-imposed tariffs has shaken global trade. While economists and financial analysts debate whether this on-again/off-again trade war fits into their model for geopolitical, economic, or supply chain risks, the result is the same: uncertainty and chaos sure to shake up business strategy for the foreseeable future. This new era of volatility […]
Blog

OpenAI Requires Identity Verification For Access To Its Latest Models

Andras Cser April 17, 2025
OpenAI announced that it will require organizations to complete an identity verification (IDV) process to verify their organization’s identity before being allowed to access the latest OpenAI models. Identity verification will likely require developers to digitally verify themselves using government-issued photo ID from permitted countries and prove their affiliation with their organization. Forrester expects that […]
Blog

Government Leaders: Prioritize Cyber Efficiency Amid Federal Volatility

Cody Scott April 17, 2025
Government agencies at the federal, state, and local levels must prepare for a future where they experience uncertainty, headcount reductions, contract cancellations, and budget cuts. This is gut-wrenchingly difficult to process, yet remaining leaders must figure out how to move forward to serve the mission. For public sector cybersecurity leaders, this is even more paramount. […]
Blog

Announcing Forrester’s Security & Risk Enterprise Leadership Award

Stephanie Balaouras April 16, 2025
Forrester is delighted to announce the opening call for our annual Security & Risk Enterprise Leadership Award. This award recognizes organizations that have transformed their security, privacy, and risk management functions into capabilities that fuel the organization’s reputation for trust and its long-term success.

Showcase Your Security & Risk Innovation With A Forrester Award

Get recognized for excellence in security, privacy, and risk innovation. Apply for a Forrester Security & Risk Enterprise Leadership Award to celebrate your success in creating resilient operations. Apply by July 23, 2025.

Blog

The Tech Exec’s Guide To Decoding Cybersecurity Vendor Performance

Madelein van der Hout April 15, 2025
Forrester analyzed the earnings calls of the 10 largest cybersecurity vendors by market cap and identified key trends for technology executives.
Blog

RSAC 2025 Early Stage Expo Preview: AppSec, IAM, GenAI, SecOps, And More

Heidi Shey April 8, 2025
As we put together our game plan for what to see at RSA Conference 2025, we wanted to scope out innovation, identify which vendor booths will be a must-see, and (at least for one of us) minimize the number of steps to take around the Moscone Center.
Blog

Address The Whole Person To Impact Insider Risk

Joseph Blankenship April 1, 2025
One of the main themes from the recent Insider Summit was that insider risk is very much a human problem, not a technology problem. Find out more in this review of the event.
Blog

Breaches And Lawsuits And Fines, Oh My! What We Learned, The Hard Way, From 2024

Janet Worthington March 25, 2025
With the average cost of a data breach at $2.7 million and 33% of enterprises reporting being breached three or more times over the past 12 months, understanding and learning from past incidents is not just beneficial — it’s essential.
Blog

Google To Acquire CNAPP Specialist Unicorn Wiz For $32 Billion

Andras Cser March 19, 2025
Learn what the largest-ever acquisition in cybersecurity means both for Google and the CNAPP space.
Blog

Apple And The UK Government Broke A “Trust Promise”

Enza Iannopollo March 6, 2025
We shared some classical Greek imagery in our recent blog on the UK government’s recent swathe of AI announcements. This week, I’m more inspired by Ancient Rome to say “mala tempora currunt!” Last month, Apple decided to stop offering its Advanced Data Protection (ADP) feature to new customers in the UK, and customers who opted […]
Blog

Quantum Security Isn’t Hype — Every Security Leader Needs It

Merritt Maxim March 3, 2025
The commercial availability of quantum computers that can compromise traditional asymmetric cryptography is still five to 10 years away. But security and risk (S&R) professionals must assess and prepare for the impact of quantum security now.
Blog

It’s Time To Define Your Professional Existence And Articulate Your Story

Kim Herrington February 27, 2025
The urgency of telling your story as a data or technology leader within the current corporate landscape cannot be overstated. As we navigate these turbulent times, the ability to articulate your professional identity clearly and compellingly has emerged as a critical lifeline. Let this be the moment you choose to define your existence within your organization and beyond.
Blog

AI And ML Security: Preventing Jailbreaks, Drop Tables, And Data Poisoning

Jeff Pollard January 30, 2025
Get a simplified view of the the top three generative AI use cases that security leaders need to worry about and get recommendations for prioritizing them.
Blog

If You’re Not Using Data Pipeline Management For Security And IT, You Need To

Allie Mellen November 12, 2024
Data ingestion into security information and event management (SIEM) have been too expensive for too long. Find out what's driving up the cost and how to manage it better in this post.
Blog

The API Security Software Landscape, Q3 2024

Madelein van der Hout November 1, 2024
While API discovery and policy enforcement have gained traction, it's time for companies to elevate their approach to API security maturity. Learn how to get started in this preview of a new report.
Webinar

Predictions 2025 APAC Webinar: Technology

Explore the 2025 technology predictions that Asia Pacific leaders need to prepare for today. Reserve your seat for our November 26 live webinar to discover the AI, privacy, data, and customer trends driving success.
Blog

Predictions 2025: Security And Risk Pros Will Brace For Regulations And Resilience

Cody Scott October 1, 2024
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
More posts