Endpoint Security

Devices connecting to networks is the bedrock of the digital economy and serve as a hacker’s bread and butter. Read our insights on endpoint security in an increasingly connected world.

Insights

Blog

It’s Time That We Activate Proactive Security

Erik Nost September 11, 2023
Learn how focusing on proactive security behaviors can relieve the ongoing security intrusions that reactive security teams must address.
Blog

Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023

David Levine August 22, 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]

Stay Ahead of Threats with These Cutting-Edge Detection Engineering Practices

Join us on Sept. 27 for a live webinar to learn how to enhance your security operations practice with agile and detection engineering practices.

Blog

Black Hat USA 2023: Insights From Our Short Vegas Residency

Jeff Pollard August 21, 2023
Black Hat USA 2023: Insights From Our Short Vegas Residency Black Hat has gone from being RSAC’s smaller tech and practitioner-focused cousin to being a commercial showcase for cybersecurity vendors. A tightly packed, noisy Business Hall included over 300 vendors and 400 organizations with booths, which was great for swag but bad for anyone with […]
Blog

Announcing Forrester’s Security & Risk Enterprise Leadership Award

Stephanie Balaouras June 21, 2023
Forrester is thrilled to announce its inaugural Security & Risk Enterprise Leadership Award, which will recognize security organizations that have transformed the security, privacy, and risk management functions to fuel long-term success. Learn how to apply here.
Blog

Protecting Against The Top Cybersecurity Threats In 2023 Requires A Balanced Approach

Brian Wrozek May 1, 2023
Get a preview of the top five cybersecurity threats — established and emerging — for this year and learn how to defend against each.
Blog

Plan Now For Major Changes To Oracle Java Licensing Costs

Steven Russman April 10, 2023
Oracle has again changed licensing rules for its widely used Java product. On January 23, 2023, the company introduced a new license metric, the SE Universal Subscription. It offers all the benefits of the legacy Java SE subscription, plus universal use rights (desktop, server, and third-party cloud) and triage support for customers’ entire Java portfolio, […]
Blog

2023 Security Recommendations: Protect Your Ass(ets) And Lawyer Up

Jeff Pollard March 6, 2023
Forrester recently published Top Recommendations For Your Security Program, 2023 for CISOs and other senior cybersecurity and technology leaders. This year’s overarching theme involves protection (as you might expect) — but not exactly in the way you’d think in the context of security. In 2023, our recommendations fall into three major strategic themes for security […]

Strenthen Security Operations With Agile SecOps

Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.

Blog

Get A Head Start On The National Cybersecurity Strategy

Jeff Pollard March 2, 2023
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog

Cybersecurity Risk Dashboards: No Value, Extreme Liability

Jeff Pollard January 30, 2023
Over the last 12 months, “risk dashboards” became all the rage in cybersecurity, with varied titles such as “risk index,” “security baseline,” “security posture,” and “risk posture.” These dashboards appear in a vendor’s user interface and purport to help security programs improve. Some even offer coveted “benchmark data” that leaders can share with boards and […]
Blog

Endpoint Management 2023: It’s Back To The Basics

Andrew Hewitt November 29, 2022
Tanium's Converge conference reveals how customers are tackling the most persistent challenges in endpoint management today.
Blog

Enterprise Browsers Reignite The Browser Wars But This Time For Businesses

Paddy Harrington November 4, 2022
I’ve been in the IT industry long enough to remember the start of the “browser wars,” when Internet Explorer took on Netscape in the late 1990s. Product names such as Mosaic, Netscape, “IE,” and Mozilla (and its next iteration with Firefox) were all part of the browser market development. Safari came along for Mac in […]
Blog

Predictions 2023: Security Pros Face Greater Internal Risks

Heidi Shey October 31, 2022
On top of the usual challenges, in 2023, security pros will see more risk coming from internal forces, such as enabling anywhere work and the future of the office. Learn more in our 2023 predictions.

Don't Get Misled By Unrealistic AI And Security Expectations

Learn the truth behind ML’s madness, how AI and security (really) work in detection and response, and red-flag claims to avoid.

Blog

Redefining Data Security For The Modern Age

Heidi Shey August 30, 2022
Learn how to redefine data security in an age of multicloud, anywhere work, edge computing, and changing privacy regulations.
Blog

The Challenges With Securing The Anywhere-Work Endpoint

Paddy Harrington August 19, 2022
Learn how endpoint security has been impacted by the more to anywhere work and what steps security pros can take in this preview of the Security & Risk event.
Blog

Vulnerability Programs Must Regain Trust To Inspire Action

Erik Nost August 17, 2022
Is using CVSS scores for risk prioritization leading to misalignment and even mistrust in your organization? Find out in this Security & Risk event session preview.