security risk management

With the proliferation of data and the ubiquity of connected devices, organizations can move with unmatched efficiency, but simultaneously incur increased risks. Read our insights on how security & risk professionals can succeed in this environment.

Discover how Forrester supports IT and security and risk leaders.

Insights

Blog

The Real Deal: A Black Friday-Inspired RFP Template For Vetting AI SaaS Vendors

Alla Valente 24 hours ago
For those of us of a certain generation, “Black Friday” invokes memories of the Cabbage Patch Kid riots of 1983. But the term Black Friday didn’t start as a feel‑good story about retailers finally getting “into the black.” It was coined in the 1950s by Philadelphia police officers to describe the chaotic, traffic‑choked day after […]
Blog

GRC Platforms Enter Their Grad School Era

Cody Scott 1 day ago
Governance, risk, and compliance (GRC) platforms are officially old enough to be in grad school. In our 2023 market evaluation, GRC technology turned 20 years old but was still figuring out what it wanted to be when it grew up. It couldn’t decide between functions like spreadsheet replacement, systems of record, or assessment and reporting. […]
Blog

Insider Incidents Can Happen To Anyone

Joseph Blankenship November 25, 2025
Managing insider risk requires steadfast focus, documenting policies, and following defined processes. Follow these four steps laid out in Forrester’s “Best Practices: Insider Risk Management” report to reduce insider risk.
Blog

OpenText Redefines Enterprise Automation And AI

Julie Mohr November 24, 2025
OpenText World 2025 marked a turning point for enterprise automation and AI. The event spotlighted innovations such as the AI Data Platform and Content Aviator, designed to embed trust, security, and context into every layer of automation. From intelligent service delivery to knowledge-centric operations, OpenText’s strategy reflects a bold vision for the future of IT, one where automation and AI work hand in hand to deliver resilience and measurable business outcomes.
Blog

SAFE Acquires Balbix

Erik Nost November 20, 2025
Cyber risk quantification (CRQ) vendor SAFE announced that it acquired unified vulnerability management vendor Balbix. The acquisition helps SAFE grow its proactive security platform. Proactive security platforms support all three principles of proactive security: visibility, prioritization, and remediation. Balbix ingests data from other vulnerability sources for visibility, prioritizes high-risk vulnerability and misconfigurations, and helps orchestrate […]
Blog

Proactive Security Platforms Will Cumulate Visibility, Prioritization, And Remediation

Erik Nost November 13, 2025
Last year, we released our inaugural Forrester Wave™ on attack surface management (ASM) solutions. The ASM Wave primarily focused on visibility — the first of the three principles of proactive security. ASM’s visibility is achieved through external asset discovery and ingestion of third-party information regarding asset attributes, and both features are becoming increasingly commoditized. Yet the ubiquity of […]
Blog

Remove Ambiguity: Measure Human Risk Management Metrics That Matter

Jinan Budge October 29, 2025
Our latest research — Five Steps To Better Human Risk Management Metrics and The Essential List Of Human Risk Management Metrics — provides security leaders the clarity they need to measure what truly matters. I see this not as just another comprehensive metrics framework (though it is that!) — I also see it as a foundation for turning human risk management from a conversation into a movement.

Predictions 2026: Your Planning Starts Here

2026 will demand proof, not promises. Explore Forrester’s Predictions resources — guides, webinars, and blogs — to plan smarter, lead with trust, and stay ahead of disruption.

Blog

AWS Outage, Nexperia Seizure, And The EU’s Cloud Sovereignty Framework: The Battle For Digital Sovereignty Is On!

Dario Maisto October 28, 2025
In times of calm, but especially in times of chaos, risk management strategies and their execution must be dictated by context and control. Prioritizing key risks and crafting appropriate responses is essential to keeping the business going.
Blog

From Veto To Victory: California’s New AI Act Revives The National (And International) Conversation On AI Regulations

Alla Valente October 24, 2025
At its core, California’s new AI law requires safety protocols, best practices, and key compliance policies, but it stops short of prescribing risk frameworks and imposing legal liabilities. Here’s a closer look at what’s in SB 53.
Blog

Fix Your GRC Blind Spots: Risk Lessons From The Louvre

Cody Scott October 24, 2025
The Louvre heist is a mirror for today’s governance, risk, and compliance gaps. Recognizing these blind spots can transform your enterprise risk efforts from decorative to defensive art. Find out how.
Blog

Risk Consulting Firms Are Getting Shaken, Not Stirred, By AI

Paul McKay October 24, 2025
Chief risk officers (CROs) are navigating a risk landscape that’s more volatile, fragmented, and tech-driven than ever. Yet many CROs still rely on advice from risk consulting services providers that are stuck in the audit compliance cottage industry of yesteryear, gently stirring into action. Learn how to select the right risk consulting provider for your organization in this preview of a new report.
Blog

Forrester’s AEGIS Framework: The New Standard For AI Governance

Jeff Pollard October 22, 2025
AEGIS is not just another acronym — it’s now a fully cross-referenced, regulation-aware blueprint for building trust in AI systems.
Blog

Announcing Forrester’s 2025 Security & Risk Enterprise Leadership Award Winners

Joseph Blankenship October 22, 2025
Learn more about the two enterprise security programs that won this year’s Security & Risk Enterprise Leadership Award.
Blog

Declaring Zero Trust Without Testing Is A Lie

Tope Olufon October 20, 2025
Zero Trust without real-world testing is a false sense of security. Learn how MITRE ATT&CK-driven adversarial trials turn Zero Trust from theory into proof.
Blog

Announcing The Cybersecurity Risk Ratings Platforms Landscape, Q4 2025

Paul McKay October 19, 2025
Despite a somewhat frustrating past, the CRRP market is truly at an inflection point — with the realization that there’s value in the data collected to produce ratings, not just the ratings themselves.
Blog

How F5 And SonicWall Revealed The Fragility Of The Software Supply Chain

Carlos Rivera October 17, 2025
The recent breaches at F5 and SonicWall illustrate how attackers are targeting the very infrastructure that enterprises rely on to secure and deliver digital services.
Blog

UK Government Plans To Mandate Digital eID For All Legal UK Residents

Andras Cser October 16, 2025
The UK government plans to mandate an electronic digital identity scheme and credential to all legal residents and employees of the UK to prove immigration and employment eligibility status. Read our assessment of the benefits, challenges, and concerns.

2026 Predictions: What Tech And Security Leaders Must Know

Our 2026 tech and security predictions are out — now it’s time to go deeper. Join Forrester’s analysts to uncover what you must do to lead with trust and value.

Blog

The Netherlands Targets Chip Governance: A New Precedent For Cyber And IP Risk Intervention

Tope Olufon October 15, 2025
The Netherlands placing Chinese-owned chipmaker Nexperia under ministerial oversight is a sign that Europe has crossed from passive screening to active control to keep IP and capacity in-region. Find out what this means for CISOs and risk leaders and what steps to take next.
Blog

Sovereignty Is The New Differentiator: Google Cloud’s Strategic Shift

Dario Maisto October 15, 2025
Sovereign cloud used to be synonymous with compliance and data protection. But as organizations tighten their sovereign policies and demand greater control over their data and cloud infrastructure, the narrative is changing.
Blog

Predictions 2026: Cybersecurity And Risk Leaders Grapple With New Tech And Geopolitical Threats

Paddy Harrington October 1, 2025
In 2026, continued political instability coupled with technological advancements being used by cybercriminals will force cybersecurity and risk leaders to adapt their defensive technologies and prepare their workforce for big shifts. Find out more in our 2026 predictions for cybersecurity and risk.
More posts