Security management
Insights
Blog
Retailers: Adopt Three Application Security Technologies Now
Three application security technologies are key for retailers to adopt before the holiday season.
Webinar
Predictions 2025 Webinar: Technology & Security
Find out where AI, cloud, and infrastructure are headed in 2025. Join our analysts on January 30 for a deep dive into our 2025 predictions for technology and security leaders.
Jan. 30 Tech & Security Predictions Webinar
Join us to dive into the top 2025 predictions and discover their impact on your tech and security strategies — with exclusive insights from the analysts who conducted the research.
Podcast
A Fresh Look At The Future Of The CISO
The role of the chief information security officer (CISO) is more vital than ever. But how are CISOs holding up under the spotlight, and how is the role changing? VP and Principal Analyst Jeff Pollard and Principal Analyst Jess Burn share some new research on the future of the CISO.
Podcast
Lessons Learned From The CrowdStrike Outage
On July 19, an update from security software vendor CrowdStrike took down 8.5 million Windows endpoints and caused widespread chaos. In this episode, VP and Research Director Amy DeMartine and Principal Analyst Allie Mellen discuss the lessons learned from the outage and what steps security and business leaders should take as a result.
Blog
Predictions 2025: Security And Risk Pros Will Brace For Regulations And Resilience
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
Blog
Apply For The 2024 Forrester Security & Risk Summit Scholarship Today
Forrester is once again partnering with Women in Security and Privacy to provide free admission to our Security & Risk Summit for four women looking to break into cybersecurity. Learn the details and find out how to apply for the scholarship here.
Webinar
How Generative AI Can Transform Security Tools: Innovations Ahead
Explore the real benefits and risks of generative AI in security tools and discover the innovations on the horizon.
Unleash Your Security Genius In Just 3 Days
Join us in Baltimore December 9–11 for our Security & Risk Summit, featuring 30-plus sessions, workshops, keynotes, case studies, and specialized tracks for targeted learning.
Blog
Systemic Gaps And Geopolitical Tensions Define Europe’s Cybersecurity Threats In 2024
European businesses, much like their global counterparts, are caught in a delicate dance, with CISOs coping with sector-specific vulnerabilities, a regulatory maze, and geopolitical complexity. Forrester’s report, European Cybersecurity Threats, 2024, offers European security leaders some much-needed clarity. Security Fundamentals Matter More Than Security Theater Technology and security professionals often find themselves captivated by the […]
Blog
CrowdStrike Holds Its Fal.Con Conference As It Tries To Move On From July 19
Here are the top things you need to know coming out of CrowdStrike's recently held Fal.Con user conference, just two months after its config update took down 8.5 million Windows endpoints.
Blog
Who Is Your CISO? Understand Their Background To Reduce Risk And Bolster Trust
One of the three principles of high-performance IT (HPIT) is to build trust on a foundation of security, privacy, and resilience. As a CIO, executing your strategy will be much easier if you unleash the talent of the person who plays an outsized role in building a trusted business: your chief information security officer (CISO). […]
Blog
Overcome The Five Poisons (Kleshas) Of Human Risk Management
We started our evaluation of human risk management solutions knowing that vendors and customers were at different stages of adoption. We faced resistance – the level of which depended on where vendors were in achieving their own vision of HRM.
Blog
Don’t Let Another Organization Win Your Forrester 2024 Security & Risk Enterprise Leadership Award
The Security & Risk Enterprise Leadership Award recognizes orgs that transformed the security, privacy, and risk management. Learn more about the award and find out how to apply.
Focus 2025 Security Budgets On Risk Mitigation And Tech Sprawl
Security leaders, explore our 2025 Planning Guide for benchmarks on where to invest, divest, and experiment with your budget.
Blog
A Recent Issue Highlights The Importance Of Securing The Hypervisor
Learn how applying Zero Trust, identity and access management, and endpoint detection and response (EDR) can help protect VMware’s ESXi hypervisor from a newly exploited vulnerability.
Blog
Falcon Fallout: What’s Next For CrowdStrike, Competitors, And CISOs
The July 19 CrowdStrike Falcon outage created major trust issues for the company and the broader security market. What's next for CrowdStrike? Find out as we make several predictions on where the company will go next.
Webinar
2025 Budget Planning Guides: Technology And Security
Watch Now! And hear analyst insights on where to invest, divest, and experiment with 2025 tech and security budgets for maximum business impact.
Blog
Invest, Experiment, And Scale Back: Budget Priorities For CISOs In 2025
The majority of security technology decision-makers anticipate further budget increases in 2025. Learn three key areas for CISOs to focus on in the year ahead in this preview of our 2025 Budget Planning Guide for security leaders.