threat intelligence
Threat intelligence is a priority for many cybersecurity organizations. But it remains elusive and difficult. Read our insights.
Insights
Blog
InfoSecurity Europe 2024: Next-Gen And AI Dominate The Show Floor
What will the short-term and the long-term impact of generative AI be on security? That was the big question at the recent InfoSecurity Europe 2024 event. Find out what we heard at the event in this blog and learn how to register for a deep-dive webinar next month.
Blog
IBM Surrenders SIEM While PANW Tries To Gain Ground On Tech Titans
Find out what Palo Alto Networks' acquisition of IBM’s QRadar business means for the broader security information and event management SIEM market.
Unleash Your Security Genius In Just 3 Days
Join us in Baltimore December 9–11 for our Security & Risk Summit, featuring 30-plus sessions, workshops, keynotes, case studies, and specialized tracks for targeted learning.
Blog
The European Cybersecurity Consulting Services Market Is Ready For Disruption
As digital threats grow more sophisticated and European and international regulatory landscapes more intricate, the role of cybersecurity consulting services is critical. Hence, I’m excited to announce The Forrester Wave™: Cybersecurity Consulting Services In Europe, Q1 2024 (available for Forrester clients). In this report, my colleagues and I scrutinize the offerings of major players in […]
Blog
Putting The New Joint Cyber Defense Collaborative Priorities Into Action
The US Cybersecurity and Infrastructure Security Agency (CISA) recently announced the 2024 cybersecurity priorities for the Joint Cyber Defense Collaborative (JCDC). Get a preview of them in this blog.
Blog
Insider Intercepted In Fantasy Football Game
Forrester data shows that 22% of data breaches in 2023 were the result of internal incidents. What does that have to do with fantasy football? Find out in this post.
Webinar
Secure Your Use Of Generative AI
Watch and learn how to use a security framework to secure genAI adoption and explore the security controls and skills crucial for safeguarding this emerging technology.
Blog
Very Human Takeaways From An AI Event
Learn key takeaways from the 2023 Berkeley Business Analytics & AI Summit, which had the theme of “Analytics, AI, and Society: Towards a Wiser World?”
Webinar
Ransomware Defense For Constrained State And Local Budgets
Explore the state of ransomware vulnerability for state and local governments — and how you can protect your agency with limited resources.
Blog
Protecting Against The Top Cybersecurity Threats In 2023 Requires A Balanced Approach
Get a preview of the top five cybersecurity threats — established and emerging — for this year and learn how to defend against each.
Blog
Supply Chain Shortage Of Transformers: More Than Meets The Eye
They say the most inopportune time to buy an umbrella is when it’s raining. That’s exactly what’s happening now to US utilities companies scrambling to procure a critical component required to beef up or repair power lines just as the US hurricane season arrives. At the heart of the headache, for the fourth year in […]
Blog
Vulnerability Programs Must Regain Trust To Inspire Action
Is using CVSS scores for risk prioritization leading to misalignment and even mistrust in your organization? Find out in this Security & Risk event session preview.
Blog
Meet The New Analyst Covering OT Security: Brian Wrozek
What Topics Will You Be Covering At Forrester? I am very excited to be covering security and risk for operational technology (OT) environments, including the critical infrastructure and manufacturing industries. This is a growing area of concern because OT-specific attacks are increasing and the stakes are higher regarding the potential impact to human safety and […]
What’s Your 2025 Budget Plan For AI, Software, & Tech Debt?
Attend our LIVE webinar on Sept. 24! Hear analyst insights on where to invest, divest, and experiment with 2025 tech and security budgets for maximum business impact.
Blog
It’s Christmas In July For Three Threat Intelligence Startups
Christmas came early for three vendors in the threat intelligence and attack surface management space this past week. In a reported all-cash $500 million deal (no need for layaway when your market cap is north of $2 trillion), Microsoft acquired threat intelligence and attack surface management vendor RiskIQ. In Europe, Swedish vulnerability risk management firm […]
Blog
Announcing The Forrester Wave™: External Threat Intelligence Services, Q1 2021
We are thrilled to announce the publication of “The Forrester Wave™: External Threat Intelligence Services, Q1 2021.” External threat intelligence services (ETIS) are important to security teams to fill gaps in their existing collection plans with specialized services that will enhance their existing cyber defense and reduce risk. External threat intelligence services are different in […]
Blog
Stay Vigilant Of The 2021 Threat Landscape And Help Your Org Prepare For “The Next Normal”
Earlier this month, a US State Department spokeswoman announced that the US had identified three online publications that were attempting to discredit the Pfizer and Moderna vaccines, all of which were directed by Russian intelligence. In Forrester’s annual report on top security threats, we explore the top security threats that security professionals must monitor, including […]
Blog
Reflections On 2020: Cybersecurity Predictions Versus Reality
You’re probably tired of hearing about 2021 cybersecurity predictions. This is something different. We’re taking a look back to what we predicted would happen in 2020 and grading our predictions. After all, why make predictions in the first place if we’re not going to reflect and assess ourselves afterward? When we make predictions, we aim to identify what is different that we think […]
Blog
Cybersecurity Lessons Learned From Snowmageddon
Social media reminded us that seven years ago, a mere two inches of snow in the middle of the day shut down Atlanta, our beloved city. It’s now affectionally referred to as Snowmageddon or Snowpocalypse. We both worked at competing security vendors then — Brian in the office at the Secureworks HQ in Sandy Springs (just […]
Blog
Voulez-Vous Parler Social Networks’ Content Moderation Policies?
My father told me once, “If you see something wrong happening in the world, you can either do nothing, or you can do something.” And I already tried nothing. — Steve Trevor, Wonder Woman Social networks, tech vendors ingesting social data, and brands running social listening practices might all be wondering the same thing right […]
Blog
Demystifying The Information Sharing Alphabet Soup
Cyberthreat intelligence (CTI) is an overcrowded space that is overdue for contraction. In general, we see it filled with smaller vendors with founders who come from an intel background, got enough funding to land a Fortune 100 client (not exclusively, mind you), and have put their logo into every pitch deck they use when going […]
Blog
Global Warming For Iceberg Metaphors
Sorting through the smoke and mirrors surrounding the dark web to deliver the truth about what it is, what it does, and what it means.
More posts