Henry Peyret

Principal Analyst

Author Insights

Blog

CISOs And The Next Era Of Security Visibility: Observability

Jeff Pollard October 18, 2021
For security leaders and practitioners, it seems like developers and IT teams get all the cool toys, and security pros get stuck with the hand-me-downs. Dev was first to cloud, IT followed, and security warily joined in. IT had patch management while security just scanned to see if the patches weren’t there; and security orchestration, […]
Read More
Blog

Halloween Comes Early For Syniverse, FB, And Twitch — What We Can Learn From Their Spooky Outages Plus Breaches

Jeff Pollard October 7, 2021
As renowned ghost hunter and solver of mysteries Scooby-Doo would say, “Ruh roh, Raggy!” It looks like more than ghosts are wreaking havoc on haunted networks. We’re less than a full week into October, and Cybersecurity Awareness Month isn’t quite taking shape the way we expected. Ostensibly, orgs decided to pivot and use this time […]
Read More
Blog

Our Take On The Microsoft Power Apps Portals Data Leak

John Bratincevic September 1, 2021
In light of the recent Power Apps portals data leak, learn three key points about the security of low-code platforms.
Read More
Blog

It’s Time For The Infosec Industry To Address Gender Bias And Bullying Head On

Jinan Budge July 11, 2021
The week of June 28 was a big one (not in a good way) for showcasing the persistence and depth of harassment and exclusion for women in cybersecurity. Those on infosec social media were flooded with bikini selfies protesting the harassment that a woman received for posting her own bikini selfie. Men and women took […]
Read More
Blog

Forrester’s List Of Ransomware Resources

Jeff Pollard June 24, 2021
With ransomware continuing as a high-impact problem (with seemingly no end in sight), we’ve put together some useful ransomware resources for security practitioners. Security and risk (S&R) pros can use these resources to help prevent, protect, detect, and respond to ransomware outbreaks. The links below are a mixture of Forrester’s own research and third-party links. […]
Read More
Blog

Trusted Third-Party Phish Is The Catch Of The Day

Joseph Blankenship June 2, 2021
We warn users not to click on suspicious emails and not to open emails from untrusted senders to prevent users from being phished. Sender identity is one of the filtering mechanisms in email security solutions. But what happens when a trusted sender’s email account is compromised and an attacker uses that access to send emails […]
Read More
Blog

Debunking Infosec Purity And Other Security Myths In The Wake Of Recent Attacks

Sandy Carielli May 21, 2021
Earlier this week, an op-ed published on The Hill sent information security (infosec) Twitter into a tizzy by blaming cybersecurity industry best practices for recent high-profile security breaches. For the security team at Forrester, the op-ed furthered a number of security myths that we felt compelled to bust here. Myth #1: The Best Infosec Pros […]
Read More
Blog

KubeCon And The (Partial) Emergence Of Enterprise Kubernetes

Lee Sustar May 18, 2021
KubeCon events can be hard to assess. Whether live or virtual, they’ve become a sprawling mix of old-school tech trade show, open source project maintainer meetup, and independent user group. KubeCon + CloudNativeCon Europe 2021 was no different. My colleague Brent Ellis led Forrester’s initial appraisal of the online event, noting greater maturity in Kubernetes […]
Read More
Blog

Biden Executive Order Bets Big On Zero Trust For The Future Of US Cybersecurity

Jeff Pollard May 13, 2021
Forrester's security team sifts through the details of the new executive order on cybersecurity and looks forward at its long-term impact.
Read More
Blog

Ransomware: Survive By Outrunning The Guy Next To You

Allie Mellen May 10, 2021
There are two people in a wood, and they run into a bear. The first person gets down on his knees to pray; the second person starts lacing up his boots. The first person asks the second person, “My dear friend, what are you doing? You can’t outrun a bear.” To which the second person […]
Read More
Blog

“Winning” MITRE ATT&CK, Losing Sight Of Customers

Jeff Pollard April 22, 2021
Are the results of a MITRE ATT&CK evaluation a good gauge of a vendor's effectiveness? Maybe. Vice President and Principal Analyst Jeff Pollard explains how to use the results in your vendor analysis.
Read More
Blog

Dell Divests VMware: Investors Cheer While Customers Yawn

Glenn O'Donnell April 15, 2021
When Dell Technologies completed its acquisition of EMC in 2016, it gained a sweetheart of an asset: VMware. More precisely, it gained 80% of VMware, making the software dynamo a mostly autonomous company in the Dell Technologies family of companies. Dell Technologies just announced the expected spinoff of that 80% ownership, making VMware a fully […]
Read More
Blog

The One Where The Car Inspection Expired Due To Malware

Joseph Blankenship April 6, 2021
We kept our research associate Alexis pretty busy during the first three months of the year, and she procrastinated getting her annual car inspection in Massachusetts done. When she showed up to get her car inspected early last week (the day before her inspection sticker expired), the service center couldn’t do the inspection. She was […]
Read More
Blog

National Poetry Month And The Case For Whimsy In Security & Risk

Sandy Carielli April 5, 2021
We all need a bit of whimsy in our lives. This is not just an excuse for a whimsical blog post, though there is that. Whimsy and laughter build bridges. And in the security world, where empathy is a critical resource, whimsy can be a first and recurring step in connecting with the teams outside […]
Read More
Blog

The Power And The Peril Of APIs

Sandy Carielli October 22, 2020
Every time we come up with new ways to build and deploy applications, we also come up with new ways to break them. Did SQL make it easier to access and manipulate large amounts of structured data? You bet, and it also led to SQL injection. Ready to join the cloud? Hope you didn’t put […]
Read More
Blog

Another Serious Player Is Entering The Data Governance 2.0 Market

Henry Peyret November 20, 2017
erwin, the very well known data modeling vendor separated from CA in 2016, is announcing a data governance module in addition to their existing suite of  Data modeling, Enterprise Architecture and Business Process modeling The first release of the data governance is benefiting of the strong metadata repository acquired from Corso and is delivering business […]
Read More
Blog

CXEurope 2017: Introducing the Values Based Customer

Henry Peyret October 18, 2017
More than 5 years ago Forrester introduced the Age of Customer as a new 15 to 20 years era which saw the increasing customer empowerment in front of brands and companies. For companies, the first step in this era turned into improving the customer experience and the customer journey through an omnichannel strategy,  identifying the […]
Read More
Blog

Uber….Pepsi….The Ringling Brothers Circus….. Our Values based analysis…

Henry Peyret April 14, 2017
Three very different brands with an unfortunate commonality: Each has recently incurred the wrath of a growing segment that Forrester calls the values-based consumer. Last week at Forrester’s Consumer Marketing Forum, my colleague Jim Nail and I launched a new line of research. It helps marketers manage the trend of consumers looking beyond the direct, personal benefits they […]
Read More
Blog

Consolidations In Data Governance Tooling Are Emphasizing DG importance For Future Data Usages

Henry Peyret February 23, 2017
While data governance has been a business need for years, it is becoming more visible as a center-stage business concern. Driving this shift are new regulations and new requirements addressing consumer data ownership, privacy, and business data monetization. Two of the most important regulations are the European General Data Protection Regulation (GDPR), and the Basel […]
Read More
Blog

Do Not Confuse Data Governance With Data Management

Henry Peyret February 17, 2016
Last week, I participated in a roundtable during a conference in Paris organized by the French branch of DAMA, the data management international organization. During the question/answer part of the conference, it became clear that most of the audience was confusing data management with data governance (DG). This is a challenge my Forrester colleague Michele […]
Read More
More posts