Endpoint Security
Devices connecting to networks is the bedrock of the digital economy and serve as a hacker’s bread and butter. Read our insights on endpoint security in an increasingly connected world.
Insights
Blog
How I Apply Third-Party Lab Results In My Security Operations Research
Last week, I attended the AV-Comparatives conference in Innsbruck, Austria. This conference brought together many cybersecurity vendors, particularly those with a European focus, as well as a few nonprofits, academic institutions, and analyst firms.
Blog
Detect, Defend, Deny: Zero Trust World 2025
Cybersecurity vendor ThreatLocker recently hosted its fifth annual Zero Trust World (ZTW) conference in Orlando, welcoming attendees from 28 countries to learn about Zero Trust principles and ThreatLocker offerings. Over two days, the event celebrated Zero Trust as a cybersecurity model and the ThreatLocker approach for achieving Zero Trust. Industry leaders, managed service providers, security […]
Plan Your IT & Security Budgets For 2025 Success
Watch our on-demand technology budget planning webinar. Get benchmarks for strategic investments, divestments, and experiments to maximize business value from 2025 tech and security spending.
Blog
Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes
MITRE released its latest Enterprise MITRE ATT&CK Evaluations in December of 2024. At that time, we published a blog with a quick overview of the results. Today, we’re excited to announce that we have released three new pieces of research about this round of evaluations.
Blog
Highlights And Implications Of Biden’s Executive Order On Strengthening And Promoting Innovation In The Nation’s Cybersecurity
Forrester's security and risk research team breaks down the key highlights and implications of former US President Joe Biden’s 2025 Executive Order (EO) 14144 on strengthening security, improving accountability for software and cloud service providers, and promoting innovation, including use of emerging technologies.
Blog
Don’t Trust Vendor Claims About Getting 100% On The MITRE ATT&CK Evaluations
The MITRE Engenuity ATT&CK Evaluations 2024 results are out. Get a detailed review in this preview of an upcoming report.
Blog
Warning: The Mobile Endpoint In Your Pocket May Be Just As Vulnerable As Your Desktop
Learn why the Android OS can be just as vulnerable to attacks as Windows and what steps you can take to minimize the risk.
Podcast
A Fresh Look At The Future Of The CISO
The role of the chief information security officer (CISO) is more vital than ever. But how are CISOs holding up under the spotlight, and how is the role changing? VP and Principal Analyst Jeff Pollard and Principal Analyst Jess Burn share some new research on the future of the CISO.
Focus 2025 Security Budgets On Risk Mitigation And Tech Sprawl
Security leaders, explore our 2025 Planning Guide for benchmarks on where to invest, divest, and experiment with your budget.
Blog
Predictions 2025: Security And Risk Pros Will Brace For Regulations And Resilience
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
Blog
Apply For The 2024 Forrester Security & Risk Summit Scholarship Today
Forrester is once again partnering with Women in Security and Privacy to provide free admission to our Security & Risk Summit for four women looking to break into cybersecurity. Learn the details and find out how to apply for the scholarship here.
Blog
CrowdStrike Holds Its Fal.Con Conference As It Tries To Move On From July 19
Here are the top things you need to know coming out of CrowdStrike's recently held Fal.Con user conference, just two months after its config update took down 8.5 million Windows endpoints.
Blog
Why Attack The Front Door If The Mobile Side Door Is Open?
When it comes to mobile device security, barely half of organizations are using unified endpoint management (UEM). That’s like locking the front door and leaving the side door wide open. Find out why security teams overlook mobile devices in this preview of our upcoming Security & Risk Summit.
Blog
Don’t Let Another Organization Win Your Forrester 2024 Security & Risk Enterprise Leadership Award
The Security & Risk Enterprise Leadership Award recognizes orgs that transformed the security, privacy, and risk management. Learn more about the award and find out how to apply.
Eliminate Your Security Gaps And Redundancies
Learn how to align your security products and services with their functions using Forrester’s Security Tools and Services Mapping (STSM).
Blog
Falcon Fallout: What’s Next For CrowdStrike, Competitors, And CISOs
The July 19 CrowdStrike Falcon outage created major trust issues for the company and the broader security market. What's next for CrowdStrike? Find out as we make several predictions on where the company will go next.
Blog
Invest, Experiment, And Scale Back: Budget Priorities For CISOs In 2025
The majority of security technology decision-makers anticipate further budget increases in 2025. Learn three key areas for CISOs to focus on in the year ahead in this preview of our 2025 Budget Planning Guide for security leaders.
Blog
Even Greener Pastures Have Their Own Manure
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
Blog
CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog
Announcing The Forrester Wave™: Extended Detection And Response Platforms, Q2 2024
Recent upheaval in the security information and event management market has created new opportunities for extended detection and response platform vendors. Get three tips on evaluating this changing market in this preview of our new Forrester Wave™ evaluation.
Blog
Announcing Forrester’s Security & Risk Enterprise Leadership Award
We have opened the call for our annual Security & Risk Enterprise Leadership Award. This award recognizes organizations that have transformed the security, privacy, and risk management functions into capabilities that fuel long-term success. Learn more about the award and how to apply.
Blog
Cisco Live EMEA 2024: Yes, AI Was Everywhere, And So Was A Surprising Amount of Innovation
Cisco Live EMEA 2024 was a different event than past years and provided some pleasant surprises. Read our key takeaways from the event based on presentations and personal interactions with some Cisco executives.
Blog
You Got Your Carbon Black In My Symantec! No, You Got Your Symantec In My Carbon Black!
What is Broadcom planning to do with VMware’s Carbon Black unit? Find out in this blog covering the plan to integrate Carbon Black with Broadcom's existing product lineup.
More posts