Security management

Insights

Blog

Splunk .conf25: Cisco, AI, And Data

Allie Mellen 22 hours ago
The 10th annual Splunk .conf took place in Boston recently. From the opening keynote to various new product releases and enhancements, get a full review of the event in this post.
Blog

School Is In Session, And Attackers Are Grading Your Software Supply Chain Security

Janet Worthington 4 days ago
Three recently revealed software supply chain attacks are a reminder of how attackers probe for any weakness in a supply chain, including smaller entities, to target larger enterprises. Find out how you can learn from these attacks to strengthen your supply chains.

Get Trusted Advice — In Seconds

AI Access puts Forrester’s trusted insights at your fingertips. Validate your strategy, align your team, and get instant advice grounded in proprietary research — no digging, no delays. It’s like having a Forrester analyst by your side, 24/7.

Blog

The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep

Paddy Harrington 4 days ago
Details have been trickling out about a security issue in Salesloft’s Drift product. Find out what data was compromised and what actions you can take to reduce the threat to your business.
Blog

Announcing The Forrester Wave™: IoT Security Solutions, Q3 2025

Paddy Harrington 6 days ago
IoT devices are a normal part of business and personal life. In enterprises, it is estimated that there are between six and 10 IoT devices for each employee, ranging from long-standing devices, such as printers and cameras, and industry-specific devices like warehouse scanners and medical infusion pumps to modern air quality monitors and soil moisture […]
Blog

Introducing Forrester AI Access: Equipping Organizations With Trusted Insights To Act Fast

Carrie Johnson September 9, 2025
Forrester AI Access is an important milestone in our AI journey, beginning with our 2023 launch of Izola. With AI Access, organizations can validate ideas, innovate, and make smarter decisions faster.
Blog

Partner For Progress: Security And HR Must Team Up For Insider Risk Management

Joseph Blankenship September 8, 2025
Since insider risk is more about people than PCs, security and insider risk management pros must make an unlikely new ally: their colleagues in HR. Find out how HR can help reduce insider risk in this preview of our upcoming Security & Risk Summit.
Blog

Announcing My Latest Forrester Wave™ Covering Managed Detection And Response Services In Europe

Tope Olufon September 4, 2025
The Forrester Wave™: Managed Detection And Response Services In Europe, Q3 2025, is live. It’s our second evaluation of the managed detection and response (MDR) space focused on the European market. It looks a bit different from our 2023 Wave, as European customers now place a greater emphasis on sovereignty, localization, speed, automation, and resilience. […]

Master Risk And Lead Through Uncertainty

Attend our Security & Risk Summit to get insider access to frameworks and tools that help security professionals navigate AI attacks, understand quantum risks, and redefine resilience.

Blog

Vibe Hacking And No-Code Ransomware: AI’s Dark Side Is Here

Jeff Pollard August 28, 2025
CISOs must recognize that AI is enabling attackers to scale operations quickly with minimal technical skill. Learn how this is happening and get four key takeaways to better defend your organization in this new era.
Webinar

Virtual Roundtable: Forrester’s Technology & Security Summit Sneak Peek

Join Forrester’s analysts for an exclusive virtual roundtable. You’ll get a first look at the insights behind our upcoming Technology & Innovation and Security & Risk Summits—plus a chance to engage directly with experts and peers in a small-group setting.
Blog

The Key To Securing Machine Identities Starts With The Human Element

Geoff Cairns August 26, 2025
As nonhuman identities grow at breakneck speed, it may be easy to forget that the key to modern machine-identity security strategy success is its human elements. Learn more in this preview of our upcoming Security & Risk Summit.
Blog

Human Risk Management: From Talk To Action In 18 Months

Jinan Budge August 12, 2025
Since its launch, human risk management has blossomed into a distinct and expanding market, attracting the interest and budget of many organizations. Learn about the fast evolution of HRM in this preview of our upcoming Security & Risk Summit.
Blog

Announcing The Forrester Wave™: Privileged Identity Management Solutions, Q3 2025

Geoff Cairns August 7, 2025
Learn three important factors to consider when planning a privileged identity management (PIM) deployment or enhancement in this preview of our new report on the PIM solution market.

Missed It Live? Unlock The Secrets To CIO & CISO Alignment

Watch this on-demand session to discover how leading CIOs and CISOs align on planning and investments to build resilient security frameworks.

Blog

Master Risk And Conquer Chaos At Forrester’s Security & Risk Summit

Amy DeMartine July 31, 2025
For leaders in security, risk, and privacy, this year has been different, with a new level of volatility fueled by geopolitics, new regulatory hurdles, relentless AI disruption, and looming quantum threats. Learn how Forrester’s Security & Risk Summit 2025 can empower you to stay ahead of the chaos, take the right risks, and secure your organization.
Blog

Palo Alto Networks Enters The Identity Security Market With $25B Purchase Of CyberArk

Allie Mellen July 31, 2025
The third-largest cybersecurity M&A deal in history makes sense in some respects, but the track record on mega security and identity tie-ups is incomplete and unproven.
Blog

Microsoft Retires Password Management In Authenticator

Andras Cser July 30, 2025
Microsoft’s move to gradually retire password management capabilities in its Authenticator application will have three immediate effects.
Blog

Announcing The Forrester Wave™: Unified Vulnerability Management Solutions, Q3 2025

Erik Nost July 29, 2025
Vulnerability management is undergoing a seismic shift. The risk-based prioritization from vulnerability risk management (VRM) has combined with attack surface management (ASM) to form exposure management and continuous security testing — two emerging practices that prioritize visibility and prioritization over remediation and response.
Blog

Drowning In Security Data Costs? You Get A Data Lake

Allie Mellen July 22, 2025
A common client request I’ve gotten over the past several years is how to best manage growing data costs in the security information and event management (SIEM) system.
Blog

Build Your Proactive Security Program By Matching Attacker Velocity

Tope Olufon July 17, 2025
Effective security must mirror attacker agility. Learn how to think like an attacker and build a proactive security strategy in this preview of our upcoming Technology & Innovation Summit EMEA.
Blog

Security Planning 2026: Budget To Manage Volatility, Seize Opportunities, And Avoid Threats

Jess Burn July 15, 2025
Security and risk leaders face an uncertain road ahead in 2026. Wild market swings, geopolitical tensions, and increased cybersecurity threats mean that security and risk leaders must build resilient plans and make bold moves to turn volatility into opportunity. Learn how our Budget Planning Guide for security and risk leaders can help.
Blog

Announcing The Forrester Wave™: Zero Trust Platforms, Q3 2025 — Choosing A Platform Solution For Your Zero Trust Journey

Carlos Rivera July 10, 2025
The latest edition of our Zero Trust platform vendor evaluation, The Forrester Wave™: Zero Trust Platforms, Q3 2025, published today. It highlights how this market continues to improve upon delivering unified solutions that help simplify and operationalize Zero Trust for organizations. Beginning with The Zero Trust Platforms Landscape, Q1 2025, we researched major players in […]
More posts