threat intelligence

Threat intelligence is a priority for many cybersecurity organizations. But it remains elusive and difficult. Read our insights.

Discover how Forrester supports IT leaders. 

Insights

Blog

Let’s Debunk Some Application Threat Modeling Myths!

Sandy Carielli September 30, 2024
Application threat modeling has gotten a bad rap over the years but security leaders need to get over the myths and implement it. Learn three of the most common misconceptions around application threat modeling in this preview of a new report and session at our upcoming Security & Risk Summit.
Blog

InfoSecurity Europe 2024: Next-Gen And AI Dominate The Show Floor

Madelein van der Hout June 10, 2024
What will the short-term and the long-term impact of generative AI be on security? That was the big question at the recent InfoSecurity Europe 2024 event. Find out what we heard at the event in this blog and learn how to register for a deep-dive webinar next month.
Blog

IBM Surrenders SIEM While PANW Tries To Gain Ground On Tech Titans

Allie Mellen May 16, 2024
Find out what Palo Alto Networks' acquisition of IBM’s QRadar business means for the broader security information and event management SIEM market.
Blog

The European Cybersecurity Consulting Services Market Is Ready For Disruption

Madelein van der Hout March 12, 2024
As digital threats grow more sophisticated and European and international regulatory landscapes more intricate, the role of cybersecurity consulting services is critical. Hence, I’m excited to announce The Forrester Wave™: Cybersecurity Consulting Services In Europe, Q1 2024 (available for Forrester clients). In this report, my colleagues and I scrutinize the offerings of major players in […]
Blog

Putting The New Joint Cyber Defense Collaborative Priorities Into Action

Brian Wrozek February 20, 2024
The US Cybersecurity and Infrastructure Security Agency (CISA) recently announced the 2024 cybersecurity priorities for the Joint Cyber Defense Collaborative (JCDC). Get a preview of them in this blog.
Blog

Insider Intercepted In Fantasy Football Game

Joseph Blankenship February 15, 2024
Forrester data shows that 22% of data breaches in 2023 were the result of internal incidents. What does that have to do with fantasy football? Find out in this post.
Webinar

Secure Your Use Of Generative AI

Watch and learn how to use a security framework to secure genAI adoption and explore the security controls and skills crucial for safeguarding this emerging technology.

Jan. 30 Tech & Security Predictions Webinar

Join us to dive into the top 2025 predictions and discover their impact on your tech and security strategies — with exclusive insights from the analysts who conducted the research.

Blog

Very Human Takeaways From An AI Event

Phyllis Davidson December 20, 2023
Learn key takeaways from the 2023 Berkeley Business Analytics & AI Summit, which had the theme of “Analytics, AI, and Society: Towards a Wiser World?”
Webinar

Ransomware Defense For Constrained State And Local Budgets

Explore the state of ransomware vulnerability for state and local governments — and how you can protect your agency with limited resources.
Blog

Protecting Against The Top Cybersecurity Threats In 2023 Requires A Balanced Approach

Brian Wrozek May 1, 2023
Get a preview of the top five cybersecurity threats — established and emerging — for this year and learn how to defend against each.
Blog

Supply Chain Shortage Of Transformers: More Than Meets The Eye

Alla Valente January 18, 2023
They say the most inopportune time to buy an umbrella is when it’s raining. That’s exactly what’s happening now to US utilities companies scrambling to procure a critical component required to beef up or repair power lines just as the US hurricane season arrives. At the heart of the headache, for the fourth year in […]
Blog

Vulnerability Programs Must Regain Trust To Inspire Action

Erik Nost August 17, 2022
Is using CVSS scores for risk prioritization leading to misalignment and even mistrust in your organization? Find out in this Security & Risk event session preview.

Ready For These 2025 Tech And Security Shifts?

Step into 2025 with confidence! Explore our predictions for tech and security leaders, featuring key trends in AI, cloud, SDLC, and AIOps you need to know.

Blog

Meet The New Analyst Covering OT Security: Brian Wrozek

Brian Wrozek July 27, 2022
What Topics Will You Be Covering At Forrester? I am very excited to be covering security and risk for operational technology (OT) environments, including the critical infrastructure and manufacturing industries. This is a growing area of concern because OT-specific attacks are increasing and the stakes are higher regarding the potential impact to human safety and […]
Blog

It’s Christmas In July For Three Threat Intelligence Startups

Brian Kime July 19, 2021
Christmas came early for three vendors in the threat intelligence and attack surface management space this past week. In a reported all-cash $500 million deal (no need for layaway when your market cap is north of $2 trillion), Microsoft acquired threat intelligence and attack surface management vendor RiskIQ. In Europe, Swedish vulnerability risk management firm […]
Blog

Announcing The Forrester Wave™: External Threat Intelligence Services, Q1 2021

Brian Kime March 23, 2021
We are thrilled to announce the publication of “The Forrester Wave™: External Threat Intelligence Services, Q1 2021.” External threat intelligence services (ETIS) are important to security teams to fill gaps in their existing collection plans with specialized services that will enhance their existing cyber defense and reduce risk. External threat intelligence services are different in […]
Blog

Stay Vigilant Of The 2021 Threat Landscape And Help Your Org Prepare For “The Next Normal”

Brian Kime March 16, 2021
Earlier this month, a US State Department spokeswoman announced that the US had identified three online publications that were attempting to discredit the Pfizer and Moderna vaccines, all of which were directed by Russian intelligence. In Forrester’s annual report on top security threats, we explore the top security threats that security professionals must monitor, including […]
Blog

Reflections On 2020: Cybersecurity Predictions Versus Reality

Heidi Shey February 8, 2021
You’re probably tired of hearing about 2021 cybersecurity predictions. This is something different. We’re taking a look back to what we predicted would happen in 2020 and grading our predictions. After all, why make predictions in the first place if we’re not going to reflect and assess ourselves afterward? When we make predictions, we aim to identify what is different that we think […]

See What’s Next For Generative AI In Security Tools

The potential for AI in security tools is just beginning! Watch our webinar replay to learn how generative AI is transforming security tools and impacting security practitioners, along with the exciting innovations that lie ahead.

Blog

Cybersecurity Lessons Learned From Snowmageddon

Brian Kime January 28, 2021
Social media reminded us that seven years ago, a mere two inches of snow in the middle of the day shut down Atlanta, our beloved city. It’s now affectionally referred to as Snowmageddon or Snowpocalypse. We both worked at competing security vendors then — Brian in the office at the Secureworks HQ in Sandy Springs (just […]
Blog

Voulez-Vous Parler Social Networks’ Content Moderation Policies?

Jessica Liu January 15, 2021
My father told me once, “If you see something wrong happening in the world, you can either do nothing, or you can do something.” And I already tried nothing. — Steve Trevor, Wonder Woman Social networks, tech vendors ingesting social data, and brands running social listening practices might all be wondering the same thing right […]
Blog

Demystifying The Information Sharing Alphabet Soup

Josh Zelonis October 21, 2019
Cyberthreat intelligence (CTI) is an overcrowded space that is overdue for contraction. In general, we see it filled with smaller vendors with founders who come from an intel background, got enough funding to land a Fortune 100 client (not exclusively, mind you), and have put their logo into every pitch deck they use when going […]
More posts