"Forrester Research" Posts

Managed Security Services Provider (MSSP) Market News: 22 July 2022

Credit: Getty Images

Today’s MSSP news involves Axonius, Detectree, Forrester, Google Cloud, Health ISAC, ITC Secure, NIST, Pondurance, Red Canary, VMware Carbon Black & more.

Managed Security Services Provider (MSSP) News: 03 June 2020

Today’s MSSP news involves A2V, Acronis, AppOmni, Armor, Cyemptive Technologies, Druva, FireEye, Forrester, Fortress, K2, Mimecast, Pax8 & more.

Top 10 Zero Trust Cybersecurity Companies for 2019

The Top 10 zero trust cybersecurity companies list actually contains 14 businesses & their partner program efforts for MSSPs (managed security services providers).

Let’s Address Cybersecurity’s Gender Disparity

Women in cybersecurity are frequently taught to manage, deflect, and defend against inappropriate behavior. Here’s the smarter path forward.

Managed Security Services Provider Morning News: 11 December 2017

MSSP updates involve Apple HomeKit vulnerability, AWS Single Sign-On, Black Hat, Cyber Insurance, enSilo, Exostar, Forrester, Herjavec Group, OXIAL & more.

U.S. Cloud Providers Face International Privacy Nightmare Amid Court Ruling

A U.S. District Court ruling requires Google to turn over Gmail data stored overseas. Cloud services providers (CSPs) & MSPs must take note.

Enterprise Security Operation Center (SOC) Spending: Smart Investment?

Fully 60% of enterprises are expanding/upgrading their security operations centers (SOCs), Forrester says. Should they hire MSSPs or external SOCs instead?

What Kind of Threat Intelligence Are You Selling Me?

The threat intelligence market is not well defined. Plus, marketing departments are playing buzzword bingo. Forrester Research explains the market.

Black Hat Cybersecurity Conference Buzzword Bingo: Platforms, Ecosystems, More

The Black Hat USA 2017 conference will generate buzzword phrases like “cybersecurity platform” and “ecosystem” and lots more, Forrester Research predicts.

Data Is The Perimeter, Defend It That Way

Data is the perimeter for any network. It is defendable, it can be clearly delineated (with some work mind you) and it can be used as a defense mechanism.