Security management

Insights

Blog

Prevent MDR-To-IR Handoff Chaos Before A Breach

Jess Burn 3 days ago
Security leaders often assume that once they’ve invested in managed detection and response (MDR) services, the hardest parts of breach detection and response are behind them. Alerts are monitored. Playbooks exist. Someone is watching the environment 24/7. Then, they have a security incident. It escalates quickly. And the response feels less coordinated than expected. We […]
Blog

White House Announces The 2026 Cyber Strategy For America

Allie Mellen March 11, 2026
On Friday, March 6, the Trump administration released the latest US national cybersecurity strategy, President Trump’s Cyber Strategy for America, alongside an executive order on combating cybercrime and fraud. The document, focused on six core pillars, is the briefest cybersecurity strategy released by the US in the last decade. The biggest challenge with the document […]

Predictions 2026: Your Planning Starts Here

2026 will demand proof, not promises. Explore Forrester’s Predictions resources — guides, webinars, and blogs — to plan smarter, lead with trust, and stay ahead of disruption.

Blog

Unified Financial Crime Management Is Not Just For Small And Regional Banks

Andras Cser March 11, 2026
Fraud management and anti-money laundering (AML) solutions share common traits and requirements: Both are about risk scoring of entities (names, phone numbers, email addresses, accounts) and routing and investigating alerts and cases to AI agents and human investigators. While smaller, regional financial institutions (FIs) and insurers have always been motivated to consolidate tools and resources […]
Blog

Announcing The Forrester Wave™: Cybersecurity Skills And Training Platforms, Q1 2026

Jess Burn March 11, 2026
The Forrester Wave™: Cybersecurity Skills And Training Platforms, Q1 2026 is now live, and it lands at a moment when security leaders are under real pressure to prove readiness and resilience. Automation and AI have compressed attacker timelines, blurred role boundaries across security teams, and exposed the limits of certification-first training models. What matters now […]
Blog

2026 Really Is This Risky: Our Top Recommendations For CISOs

Jess Burn March 4, 2026
Security leaders entered 2026 with little expectation that uncertainty will ease … ever. Economic pressure, geopolitical instability, accelerating artificial intelligence adoption, and renewed technology consolidation have turned volatility into a structural condition rather than a temporary disruption. This is life now, and CISOs are being asked to move faster, support aggressive AI initiatives, and protect […]
Blog

What We’re Looking Forward To At The RSAC 2026 Conference

Joseph Blankenship February 25, 2026
The annual RSAC Conference in San Francisco is the cybersecurity industry’s biggest event of the year. For the analysts attending, RSAC Conference week provides an opportunity to learn about cybersecurity trends and topics, meet with vendors and clients, and share our insights and observations. It’s also an excellent opportunity to meet our daily step goals […]
Blog

Think Hardware Security Modules Aren’t Exciting? Think Post-Quantum Migration!

Andras Cser January 30, 2026
Hardware security modules (HSMs) are a key foundational security component of public key infrastructure. HSMs hold the crown-jewel keys for encryption and digital signatures and perform encryption and decryption operations on protected data and payment information. While HSMs have been in use for decades, they now play an oversized role in migrating to post-quantum security […]

Now On Demand: 2026 Tech And Security Predictions

Missed it live? Watch our on-demand webinar to explore our 2026 predictions. Learn what tech and security leaders must do to lead with trust and value.

Blog

Weaponized Insiders Can Result In Big Consequences

Joseph Blankenship January 27, 2026
The US Department of the Treasury recently announced that it is canceling all of its contracts, reportedly valued at $21 million, with technology provider Booz Allen Hamilton (BAH) due to an insider incident that occurred between 2018 and 2020. The incident resulted in the theft of tax return data for more than 400,000 US taxpayers and the release of tax information about high-net-worth […]
Blog

Ready For OpenClaw To Pry Into Your Environment And Grip Your Data

Jeff Pollard January 26, 2026
A formidable challenge awaits security leaders as personal tools like Moltbot spread. AI butlers are the next shadow super-user.
Blog

Mastering An Effective Executive Tabletop Exercise: Deriving Maximum Value And Impact

David Levine January 22, 2026
So you’ve decided to run an executive tabletop exercise (TTX) and pulled off the Herculean feat of getting it scheduled. Will this be a career-limiting move or career highlight? Let’s go for the latter. Done right, a good TTX will drive tremendous value for the company and garner you accolades. I have yet to do […]
Blog

The Success Of Your Proactive Security Strategy Depends On Your Answer To Six Questions

Erik Nost January 20, 2026
Proactive security has always been based on three principles: visibility, prioritization, and remediation. But in the age of AI, each principle will continue to experience challenges. In our latest research, The Future Of Proactive Security, we found that the future of proactive security hinges on how well teams answer six foundational questions across each principle: what, when, where, why, how, and who. Since AI accelerates […]
Blog

ServiceNow Buys Armis To Improve Its Proactive Security Platform

Erik Nost January 14, 2026
ServiceNow has announced its intent to acquire proactive security platform vendor Armis in a cash deal valued at $7.75 billion.
Podcast

Women In Security, Holiday Shopping Trends, AI Agents In Content

What It Means January 8, 2026
Happy New Year! We kick off 2026 by unpacking lessons from 2025 and what they signal for the year ahead. This episode brings together security, marketing, and content leaders’ perspectives so you can act with confidence.
Blog

MITRE ATT&CK Evaluations Return: More Coverage, More Nuance

Allie Mellen December 10, 2025
There were many big changes in this latest round. Read our breakdown and what we learned.
Blog

Updating Our Security Champions Research To Expand And Strengthen Security

Jinan Budge November 30, 2025
A strong security culture is the foundation of an effective security program. That’s why we’re revisiting essential research that explores how to build a security champions network, examining how security champion networks can help scale influence, embed security into everyday decisions, and foster trust across the business.
Blog

Paying To Observe It All: Palo Alto Networks’ Acquisition Of Chronosphere

Carlos Casanova November 26, 2025
The move marks a departure from PANW's security pure-play roots. What's behind the acquisition, and what does it means for PANW and Chronosphere customers going forward?
Blog

Insider Incidents Can Happen To Anyone

Joseph Blankenship November 25, 2025
Managing insider risk requires steadfast focus, documenting policies, and following defined processes. Follow these four steps laid out in Forrester’s “Best Practices: Insider Risk Management” report to reduce insider risk.

2026 Tech & Security Predictions You Can’t Afford To Miss

AI cleanup, budget shifts, neocloud, and quantum threats — what’s ahead could reshape your strategy. Get Forrester’s guide with five bold predictions to stay ahead and lead with trust and value.

Blog

AI Vendor Threat Research And Cybersecurity’s Cynicism Problem

Jeff Pollard November 24, 2025
For years, the security community decried the lack of transparency in public breach disclosure and communication. But when AI vendors break with old norms and publish how attackers exploit their platforms, that same community’s reaction is split. Some are treating this intelligence as a learning opportunity. Others are dismissing it as marketing noise. Unfortunately, some […]
Blog

How To Thrive In Chaos: Lessons Learned From The Forrester Women’s Leadership Program At Security & Risk Summit

Janet Worthington November 20, 2025
The noise in and outside of cybersecurity is constant, with new threats, new tools, and new expectations. Thriving in this environment doesn’t take luck; it requires discipline. And right now, the backdrop is intense: nearly 1 million job cuts this year, workloads rising, and responsibilities shifting, leaving everyone uncertain. Those who remain are not necessarily […]
Blog

Anthropic Catches Attackers Using Agents In The Act

James Plouffe November 17, 2025
On November 13, AI vendor Anthropic published details about the disruption of what it characterized as an AI-led cyber espionage operation. Learn what is in Anthropic's report and get tips on how to protect against future AI-enabled attacks.
More posts