network security
In an increasingly connected world, excellent network security is a business imperative. Read our insights on how your business can protect its networks.
Insights
Webinar
How To Enhance Your Security Operations Practice With Agile And Detection Engineering
Join us on Sept. 27 for a deep dive on detection engineering in security operations. Hear Forrester advice on best practices and the use of detection–as–code.
Blog
2003 Called, And It Doesn’t Want Its Email Security Appliances Back
Email security appliances have come a long way in the past 20 years. Learn the benefits of cloud-delivered email security.
Stay Ahead of Threats with These Cutting-Edge Detection Engineering Practices
Join us on Sept. 27 for a live webinar to learn how to enhance your security operations practice with agile and detection engineering practices.
Blog
Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]
Blog
Announcing Forrester’s Security & Risk Enterprise Leadership Award
Forrester is thrilled to announce its inaugural Security & Risk Enterprise Leadership Award, which will recognize security organizations that have transformed the security, privacy, and risk management functions to fuel long-term success. Learn how to apply here.
Blog
Shift-Everywhere Is The Bullet Train To Secure Software
Application security is in the spotlight with continued breaches due to the vast attack surface applications and their ecosystems provide.
Blog
The Microsegmentation Plot Thickens
Inquiries about microsegmentation (also called Zero Trust segmentation) have been rising steadily, especially since the start of the year. This is great, because it means people are getting serious about Zero Trust (microsegmentation is the super-serious part). All these phone calls are prompting me to share my latest thoughts on the subject, so here we […]
Blog
Protecting Against The Top Cybersecurity Threats In 2023 Requires A Balanced Approach
Get a preview of the top five cybersecurity threats — established and emerging — for this year and learn how to defend against each.
Strenthen Security Operations With Agile SecOps
Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.
Blog
The EU Cyber Solidarity Act Will Fail If It Is Stunted By Geopolitics And Protectionism
On 18 April 2023, the European Commission adopted a proposal for the EU Cyber Solidarity Act to strengthen cybersecurity capabilities in the EU. The proposed act will support detection and awareness of cybersecurity threats, bolster preparedness of critical entities, reinforce solidarity, and improve crisis management and response capabilities across member states. Additionally, the Commission presented […]
Blog
Get A Head Start On The National Cybersecurity Strategy
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog
Introducing Forrester’s Network Analysis And Visibility Landscape, Q1 2023
In today’s Zero Trust (ZT) world, organizations have been heavily focused on Zero Trust edge identity solutions. In some cases, however, they’ve neglected visibility across all the connections, endpoints, and applications in the enterprise. Network analysis and visibility (NAV) solutions have become almost an afterthought to ZT, but they are actually central to a robust […]
Blog
A Zero Trust Paradox: Which Comes First, Microsegmentation Or Microperimeter?
The common trope, “What came first, the chicken or the egg?” is a question about origins and paradoxical relationships. Security and risk conversations about microsegmentation and microperimeters suffer from a similar dilemma. These two concepts are heavily emphasized in Zero Trust conversations as key components to advance maturity. Security and risk pros confuse the usage […]
Blog
Cybersecurity Risk Dashboards: No Value, Extreme Liability
Over the last 12 months, “risk dashboards” became all the rage in cybersecurity, with varied titles such as “risk index,” “security baseline,” “security posture,” and “risk posture.” These dashboards appear in a vendor’s user interface and purport to help security programs improve. Some even offer coveted “benchmark data” that leaders can share with boards and […]
Don't Get Misled By Unrealistic AI And Security Expectations
Learn the truth behind ML’s madness, how AI and security (really) work in detection and response, and red-flag claims to avoid.
Blog
Enterprise Firewalls: The Security Tech That Keeps On Ticking
Learn the three approaches enterprise firewall vendors are taking to work around a shortage of network security techs.
Blog
Has Zero Trust Killed Defense in Depth? Or “DiD” It Refine It?
Zero Trust (ZT) continues to make waves (no pun intended), with US federal agencies now publishing guidance, such as the OMB’s M-22-09 or the DoD’s ZT strategy, for effective implementations, allowing for the government to be viewed as a source of trust in cybersecurity — although ZT is still mired in myths, and these can […]
Blog
Predictions 2023: Economic Uncertainty And Climate Shifts Will Shape Edge, IoT, And Networking
From the city to the farm, market forces will have a dramatic impact on edge, IoT, and networking. Learn more in our 2023 predictions.
Blog
Predictions 2023: Security Pros Face Greater Internal Risks
On top of the usual challenges, in 2023, security pros will see more risk coming from internal forces, such as enabling anywhere work and the future of the office. Learn more in our 2023 predictions.
Blog
Prefacio: Mi Blog de Introducción
Dándole seguimiento a los múltiples mensajes de apoyo y animo en este nuevo capítulo de mi vida, he decidido escribir un prefacio. He escogido intencionalmente “Prefacio” como el título de este primero blog para indicar que no solo se trata de un capítulo, pero será un libro lleno de revelaciones para líderes de negocios y […]
Seven Steps To Bolstering Network Security With Zero Trust Edge
Watch this video to break down vendor ZTE hype and learn how to implement it across all endpoints in an enteprisewide networking fabric.
Blog
A Preface: My Introductory Blog
Following the multiple messages of support and encouragement in this new chapter of my life, I have decided to write a preface. I have intentionally chosen “A Preface” as the title of this first blog to indicate that it’s not only going to be a chapter but a book full of insight for business and […]
Blog
SD-WAN Sunsets And ZTE Emerges
Software-defined WAN (SD-WAN) has started to ride off into the sunset (which is long overdue). For some time, you might see some vendors wandering around aimlessly, hoping to sell you a SD-WAN solution, but for the most part, the networking market is moving on. It didn’t happen like I predicted. I thought the SD-WAN acronym […]
Webinar
Shape Your 2023 Cybersecurity Priorities For Uncertain Times
As 2023 approaches, security leaders are hard at work planning for the cybersecurity trends headed our way – setting budgets, developing plans, and establishing priorities. Is your plan on track?
More posts