Security management
Insights
Blog
CrowdStrike Fal.Con 2025: Flexing Into The Agentic AI Age
CrowdStrike held its Fal.Con 2025 conference recently and not surprisingly for a cybersecurity vendor event in 2025, AI dominated. Get our highlights and key takeaways here.
Blog
Your Top Questions On Generative AI, AI Agents, And Agentic Systems For Security Tools Answered
Many security professionals are still confused about which AI capabilities are real now and which will come down the road. Get answers to some of the most common questions about use of generative AI, agentic AI, and AI agents in security tools in this preview of our upcoming Security & Risk Summit.
Lead A Security Org That Performs, Scales, And Thrives
Download our guide to help CISOs prove business value, win budget, and reduce burnout. Use our actionable framework to align security with enterprise goals, justify funding, and lead a high-performing team.
Blog
Securing AI’s M&A Feeding Frenzy Is On
The cybersecurity industry is in the middle of a land grab as AI security M&A heats up. In just 18 months, eight major vendors — including Check Point, Cisco, CrowdStrike, F5, and Palo Alto Networks — have spent upwards of $2.0 billion acquiring startups focused on securing enterprise AI. AI for security is already poised to disrupt […]
Blog
Get Your Zero Trust Initiative Back On Track With Forrester’s Zero Trust RASCI Chart
One of the biggest challenges to a Zero Trust journey can be misalignment between teams. Learn how our Zero Trust RASCI Chart can help define roles and responsibilities across the core domains of Zero Trust.
Blog
Splunk .conf25: Cisco, AI, And Data
The 10th annual Splunk .conf took place in Boston recently. From the opening keynote to various new product releases and enhancements, get a full review of the event in this post.
Blog
School Is In Session, And Attackers Are Grading Your Software Supply Chain Security
Three recently revealed software supply chain attacks are a reminder of how attackers probe for any weakness in a supply chain, including smaller entities, to target larger enterprises. Find out how you can learn from these attacks to strengthen your supply chains.
Blog
The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep
Details have been trickling out about a security issue in Salesloft’s Drift product. Find out what data was compromised and what actions you can take to reduce the threat to your business.
The Countdown To 2026 Predictions Has Begun
Don’t miss your chance to lead with confidence. Get early access to Forrester’s expert guidance across marketing, CX, digital, tech, and security.
Blog
Announcing The Forrester Wave™: IoT Security Solutions, Q3 2025
IoT devices are a normal part of business and personal life. In enterprises, it is estimated that there are between six and 10 IoT devices for each employee, ranging from long-standing devices, such as printers and cameras, and industry-specific devices like warehouse scanners and medical infusion pumps to modern air quality monitors and soil moisture […]
Blog
Introducing Forrester AI Access: Equipping Organizations With Trusted Insights To Act Fast
Forrester AI Access is an important milestone in our AI journey, beginning with our 2023 launch of Izola. With AI Access, organizations can validate ideas, innovate, and make smarter decisions faster.
Blog
Partner For Progress: Security And HR Must Team Up For Insider Risk Management
Since insider risk is more about people than PCs, security and insider risk management pros must make an unlikely new ally: their colleagues in HR. Find out how HR can help reduce insider risk in this preview of our upcoming Security & Risk Summit.
Blog
Announcing My Latest Forrester Wave™ Covering Managed Detection And Response Services In Europe
The Forrester Wave™: Managed Detection And Response Services In Europe, Q3 2025, is live. It’s our second evaluation of the managed detection and response (MDR) space focused on the European market. It looks a bit different from our 2023 Wave, as European customers now place a greater emphasis on sovereignty, localization, speed, automation, and resilience. […]
Blog
Vibe Hacking And No-Code Ransomware: AI’s Dark Side Is Here
CISOs must recognize that AI is enabling attackers to scale operations quickly with minimal technical skill. Learn how this is happening and get four key takeaways to better defend your organization in this new era.
Get Trusted Advice — In Seconds
AI Access puts Forrester’s trusted insights at your fingertips. Validate your strategy, align your team, and get instant advice grounded in proprietary research — no digging, no delays. It’s like having a Forrester analyst by your side, 24/7.
Webinar
Virtual Roundtable: Forrester’s Technology & Security Summit Sneak Peek
Join Forrester’s analysts for an exclusive virtual roundtable. You’ll get a first look at the insights behind our upcoming Technology & Innovation and Security & Risk Summits—plus a chance to engage directly with experts and peers in a small-group setting.
Blog
The Key To Securing Machine Identities Starts With The Human Element
As nonhuman identities grow at breakneck speed, it may be easy to forget that the key to modern machine-identity security strategy success is its human elements. Learn more in this preview of our upcoming Security & Risk Summit.
Blog
Human Risk Management: From Talk To Action In 18 Months
Since its launch, human risk management has blossomed into a distinct and expanding market, attracting the interest and budget of many organizations. Learn about the fast evolution of HRM in this preview of our upcoming Security & Risk Summit.
Blog
Announcing The Forrester Wave™: Privileged Identity Management Solutions, Q3 2025
Learn three important factors to consider when planning a privileged identity management (PIM) deployment or enhancement in this preview of our new report on the PIM solution market.
Blog
Master Risk And Conquer Chaos At Forrester’s Security & Risk Summit
For leaders in security, risk, and privacy, this year has been different, with a new level of volatility fueled by geopolitics, new regulatory hurdles, relentless AI disruption, and looming quantum threats. Learn how Forrester’s Security & Risk Summit 2025 can empower you to stay ahead of the chaos, take the right risks, and secure your organization.
Master Risk And Lead Through Uncertainty
Attend our Security & Risk Summit to get insider access to frameworks and tools that help security professionals navigate AI attacks, understand quantum risks, and redefine resilience.
Blog
Palo Alto Networks Enters The Identity Security Market With $25B Purchase Of CyberArk
The third-largest cybersecurity M&A deal in history makes sense in some respects, but the track record on mega security and identity tie-ups is incomplete and unproven.
Blog
Microsoft Retires Password Management In Authenticator
Microsoft’s move to gradually retire password management capabilities in its Authenticator application will have three immediate effects.
Blog
Announcing The Forrester Wave™: Unified Vulnerability Management Solutions, Q3 2025
Vulnerability management is undergoing a seismic shift. The risk-based prioritization from vulnerability risk management (VRM) has combined with attack surface management (ASM) to form exposure management and continuous security testing — two emerging practices that prioritize visibility and prioritization over remediation and response.
More posts