Zero Trust Model
As data security becomes a business imperative for every company and industry, leveraging a Zero Trust security framework (ZTX) can streamline the path to compliance. Learn more about Forrester’s Zero Trust research and framework here.
Insights
Blog
All Aboard: Chart Your Course To Zero Trust Intermediate
Organizations around the world are embarking on their Zero Trust journeys. Often, these voyages are undertaken without a complete understanding of the destination: Zero Trust maturity. Reaching a level of Zero Trust maturity requires careful planning and a steady course to get there. Forrester recently published a report to help security and IT pros achieve […]
Blog
Zero Trust Comes Into The Mainstream In Europe
Until recently, discussions about Zero Trust (ZT) in Europe focused on the what and why. The last year has seen a significant shift in the market, and organizations have now begun focusing on the how. European organizations see significant value in adopting Zero Trust and have taken steps to prioritize adoption. This trend is driven […]
Put Public-Sector 2023 Success Into Perspective
Join us for a Predictions 2023 webinar on the staffing and data integrity pressures to plan for now.
Blog
Get A Head Start On The National Cybersecurity Strategy
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog
Success With Zero Trust Lives And Dies By Executive Support
Forrester originated the Zero Trust Model over a decade ago and defines Zero Trust as: An information security model that denies access to applications and data by default. Threat prevention is achieved by only granting access to networks and workloads utilizing policy informed by continuous, contextual, risk-based verification across users and their associated devices. Zero Trust advocates […]
Blog
Enterprise Firewalls: The Security Tech That Keeps On Ticking
Learn the three approaches enterprise firewall vendors are taking to work around a shortage of network security techs.
Blog
’Tis The Season To Highlight Our Favorite 2022 S&R Research
It’s December, the year is almost over, and most of us will be taking the next week off, so what better way to wrap up 2022 than with a review of some of our favorite security and risk (S&R) reports from this year? I teamed up with Senior Research Associate Alexis Tatro to highlight her […]
Blog
Meet The New EMEA Cybersecurity Analyst
Meet Tope Olufon, the new analyst covering cybersecurity in EMEA.
Shape Your 2023 Cybersecurity Priorities For Uncertain Times
Join us for a planning webinar to learn how you can budget and align your 2023 cybersecurity plans for what’s ahead.
Blog
Redefining Data Security For The Modern Age
Learn how to redefine data security in an age of multicloud, anywhere work, edge computing, and changing privacy regulations.
Blog
New Security & Risk Planning Guide Helps CISOs Set 2023 Priorities
Which security technologies should be getting the investment in 2023, and which ones should you be scaling back on? Read a few key takeaways from our planning guide for security and risk leaders.
Blog
US Federal Government Continues Cybersecurity Leadership With New OMB Memo
The guidance in the new memorandum enables federal civilian agencies to properly assign cyber-initiative funding toward the most critical areas. Here, we take a closer look.
Blog
SentinelOne Secures Identity First, Deception Second, In Attivo Acquisition
Endpoint security and extended detection and response (XDR) vendor SentinelOne today announced the acquisition of Attivo Networks for just over $600 million. Attivo was a darling of deception technology, but SentinelOne was really after its Active Directory protection portfolio, including ADAssessor and ADSecure. Enterprise identity plays a critical role in the Zero Trust world mandated […]
Blog
Chronicles Of Mandiant: Google Put A Ring On It
Mandiant trades up from FireEye and finds a home within Google Cloud Platform.
Blog
OMB’s Zero Trust Strategy: Government Gets Good
What a time to be alive! Hot on the heels of Forrester’s release of our definition of modern Zero Trust (ZT), the US Office of Management and Budget (OMB) released a memo entitled Moving the US Government Toward Zero Trust Cybersecurity Principles. Coincidence? Yes. A big deal? Also, yes. If executed as mandated, not only […]
Blog
The Definition Of Modern Zero Trust
Zero Trust faces a bizarre dichotomy. Learn what it is — and perhaps more importantly what it isn't today.
Blog
The Future Of Healthcare
Healthcare is going to see some dramatic change in the decade ahead. Find out which areas are most likely to be impacted and what leaders can do to set their healthcare organizations up for success.
Blog
Introducing The Ransomware Survival Guide
Time and time again, we’ve heard these two burning questions from so many organizations: “How do we protect ourselves against ransomware?” and “Where do we start?” We’ve all seen the ransomware “research” landscape — littered with top-10 lists, vendor cure-alls (spoiler: don’t depend on one security tool to completely eradicate ransomware), and so many other […]
Blog
Forrester Security & Risk Forum 2021: Be Part Of Our World
Maybe it’s the amazing talks coming up today and tomorrow at the Forrester Security & Risk (S&R) Forum or maybe I’ve watched “The Little Mermaid” with the family one time too many — either way, I was inspired to write a little ditty about the forum, sung to the tune of “Part of Your World.” […]
Blog
Forcepoint Acquires Bitglass
In its quest to add to its Zero Trust edge (ZTE), also known as secure access service edge (SASE), portfolio, Forcepoint acquired cloud security gateway (CSG), also known as cloud access security broker (CASB), provider Bitglass for a Forrester-estimated $200-300 million last week. Beyond the usual criteria (ability to retain marketing and development talent of Bitglass), […]
Blog
Halloween Comes Early For Syniverse, FB, And Twitch — What We Can Learn From Their Spooky Outages Plus Breaches
As renowned ghost hunter and solver of mysteries Scooby-Doo would say, “Ruh roh, Raggy!” It looks like more than ghosts are wreaking havoc on haunted networks. We’re less than a full week into October, and Cybersecurity Awareness Month isn’t quite taking shape the way we expected. Ostensibly, orgs decided to pivot and use this time […]
Blog
Zero Trust For Healthcare Orgs Is Just What The Doctor Ordered
Healthcare data is low-hanging fruit for hackers. Learn how adopting a Zero Trust strategy can help keep your data safe.
More posts