This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Today, Microsoft announced that the official launch day of Copilot for Security for will be April 1, 2024. This proves that Microsoft won’t let a late-night snowstorm stop its pursuit of security revenue or finding new applications for generative AI.
In a 2016 New York Times Magazine profile of Ben Rhodes, President Obama’s then deputy national security adviser for strategic communications, Ben was quoted as calling the American foreign-policy establishment “the Blob.”
Zero Trust is not one product or platform; it’s a security framework built around the concept of “never trust, always verify” and “assuming breach.” One of the top challenges and misunderstandings that I continue to see here at Forrester is about what the definition of Zero Trust actually is.
Forrester’s list of the top 10 emerging technologies for 2024 reflects the continued dominance of AI but also emphasizes the growing importance of security in our increasingly connected world. Get a deep dive on the top 10 list in this blog post.
Speaker: Hilary Akhaabi, PhD - Founder, Chief Financial & Operations Officer at Go Africa Global
Register now to secure your spot! Managing and Enforcing Expense Policies 📊 Understand how to develop and enforce company expense policies that promote financial discipline and cost-efficiency. Don't miss this opportunity to transform your approach to revenue optimization and take your financial leadership to the next level.
We just released a huge new report: How Security Tools Will Leverage Generative AI with collaboration across the entire Forrester Security and Risk team.
We recently published the Top Recommendations For Your Security Program, 2024 report for CISOs and other senior cybersecurity and technology leaders. In 2024, our recommendations fall into three major themes for security leaders: Changing tech. Changing threats.
in security): the silos between technology and security teams. I’m thrilled to announce our latest research into a problem as old as time (or, at least, my time — 25 years! — How big is the problem?
Everything you need to know about payment optimization – an easy-to-integrate, PCI-compliant solution that enables companies to take control of their PSPs, minimize processing costs, maximize approval rates, and keep control over their payments data.
A few weeks ago, I spoke on a podcast with some of my former colleagues about my experiences in the security industry as a young woman. TL;DR: It’s not always great, and that’s true for many women in the industry. We showed that in our research on Best Practices: Recruiting, Retaining, And Advancing Women In […]
The current relationship status between marketing and security and risk (S&R) pros is best described as “it’s complicated.” This may seem cheeky and slightly exaggerated, until you learn that a whopping 78% of B2C marketing leaders say that they don’t know anyone on their security, risk, and compliance team.
In my latest report, The State Of Data Security, 2023, we reviewed and analyzed Forrester survey data to identify the key data security trends of the year. What constitutes sensitive data for organizations today has greatly expanded in type and format. This includes diving into the causes of breaches, the types of […]
Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association
PCI compliance can feel challenging and sometimes the result feels like you are optimizing more for security and compliance than you are for business outcomes. They’ll share how to grow your business faster and minimize costs for both security and compliance. The key is to take the right strategy to PCI compliance that gets you both.
As security threats increase, data protection and security practices continue to merge. Data resilience firm Rubrik recently announced its acquisition of Laminar, a data security posture management (DSPM) vendor. Modern Data Resilience Is Increasingly A Cybersecurity Issue […]
This is yet another example of raising awareness and issuing calls to action for post-quantum security preparations. This follows the World Economic Forum and Deloitte issuing a perspective on transitioning to a quantum-secure economy in 2022. Also in late 2022, […]
Couldnt make the recent webinar covering our 2025 technology and security predictions? Check out the webinar replay and read our analysts responses to some of the most pressing attendee questions about the year ahead.
Data security is both a high priority and struggle for many organizations. Find out why and get some next steps in this preview of our upcoming Security & Risk Summit December 9-11 in Baltimore.
In this ebook, you’ll see how the right technology can help brands and manufacturers secure the product data governance they need to power this circular transition. Going circular is not an overnight switch. It requires forward planning and data-driven decision-making.
However, there remains a gap on the security side. Retailers have expanded their application portfolios rapidly, but many of their security processes are still tied to older technologies that werent designed to keep pace with modern application development. This is where Application Security Posture Management (ASPM) becomes essential.
ASIS International, the largest membership organization for security management professionals, brought the 2023 Global Security Exchange (GSX) to my hometown of Dallas, Texas. The main attraction of this premier physical security event was the keynote delivered by the 43rd President of the United States, George W.
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. There are tangible benefits to you, your team, your organization, and the greater security community. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply.
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
Join Igli Laci, Strategic Finance Leader, in this exclusive session where he will explore how a well-crafted pricing approach balances customer perception with business objectives, creating a powerful tool for securing both competitive advantage and financial stability!
For the past year, I have been doing a deep dive into Forrester’s future fit research and its intersection with security and risk. As a quick refresher, technology organizations fall into one of three categories in their technology strategy: traditional tech, modern tech, and future fit tech.
Because a problem in one area of your business can cause security or fraud issues in another, it can be helpful to take an end-to-end look at your security and fraud prevention practices to identify gaps and make improvements. Ask for documentation of suppliers data security practices and incident response plans.
The FBI’s Cyber Division issued an advisory which “strongly advises” that organizations still using Barracuda Networks Email Security Gateway (ESG) appliances affected by an exploit of CVE-2023-2868 remove those appliances “immediately.” This advisory builds on the vendor’s own recommendations to replace its ESG appliances.
Because security cameras, access control systems and automatic license plate readers are there to protect people, products and premises, they are often overlooked as a source of vulnerability. Physical security systems are a common blind spot — and a potentially dangerous one. However, some devices have well-known flaws.
This eBook provides a practical explanation of the different PCI compliance approaches that payment card issuers can adopt, as well as the importance of both protecting user PII and gaining ownership and portability of their sensitive data.
At its annual flagship event, Cisco Live, about 20,000 IT and security pros gathered in Las Vegas to hear the company’s latest announcements, plans for its $28 billion Splunk acquisition, and vision for the future.
What We Know – And What To Do Now Technology leaders woke up to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong and disrupted major systems at organizations across both countries.
Forrester is once again partnering with Women in Security and Privacy to provide free admission to our Security and Risk Summit for four women looking to break into cybersecurity. Learn the details and find out how to apply for the scholarship here.
We have a national day or month for just about everything. Some of my personal favorites include National IPA Day (first Thursday in August), National Waffle Day (August 24), National Rescue Dog Day (May 20), and National Insider Threat Awareness Month (September).
Of significance to New York business owners, workers and consumers, the measure includes a new Retail Security Tax Credit , which for tax years 2024 and 2025 will provide assistance to businesses for investing in necessary equipment to protect their employees and merchandise. billion from various kinds of thefts. 31 of each year.
In May, Forrester announced our Security & Risk Enterprise Leadership Award. The Security & Risk Enterprise Leadership Award will recognize organizations — and their leaders — that have transformed the security, privacy, and risk management functions.
A full-stack developer must program in HTML/CSS and JavaScript as well as be responsible for back-end development of sever-side processes for data storage and retrieval, business logic tasks, authentication, and integration with third-party APIs in programming languages such as Go,NET, Java, Rust, and Node.js.
You’re driving to the supermarket when, suddenly, your check engine light comes on. Nothing sounds wrong — your vehicle is still moving just fine, and you really have to go shopping. So for now, you’ll deprioritize the check engine light. Yes, you have also deprioritized those oil changes, the coolant flush, the tire rotation, and […]
And the problem is not new – security leaders have struggled with managing their SIEM budget for over a decade. Data ingestion into the SIEM is too expensive. In fact, it’s so expensive that, “How do we reduce our SIEM ingest costs?” is one of the top inquiry questions I get from Forrester clients. Visibility […]
I take a lot of inquiry questions from Forrester’s security and risk clients about security operations (SecOps). Forrester data indicates that 17% of security decision-makers say that the inability to measure the effectiveness of their security program is a top security […]
This is a massive investment and win for Cisco from two perspectives: observability and security. Similarly on the security side, Cisco […] On Sept 21, Cisco announced its intention to buy Splunk for $28B in cash, it’s largest acquisition ever and fourth this year.
The majority of security technology decision-makers anticipate further budget increases in 2025. Learn three key areas for CISOs to focus on in the year ahead in this preview of our 2025 Budget Planning Guide for security leaders.
We organize all of the trending information in your field so you don't have to. Join 24,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content