Blog
Security leaders often assume that once they’ve invested in managed detection and response (MDR) services, the hardest parts of breach detection and response are behind them. Alerts are monitored. Playbooks exist. Someone is watching the environment 24/7. Then, they have a security incident. It escalates quickly. And the response feels less coordinated than expected. We […]
Blog
AI is transforming how experience research is conducted—from planning to analysis—with new tools like AI moderators. If you are a research vendor offering AI moderators, or a researcher who has used AI moderated interviews, I want to talk to you.
Blog
Our brand new global study into public sector purchasing reveals a market full of opportunity, but also increasing complexity. One of the most striking findings is just how large and distributed public sector buying groups have become. Typical purchase decisions now involve 14 internal stakeholders (rising to 18 in APAC). When the broader buying network […]
Blog
A recent cyberattack on a global medical device manufacturer shows how third-party failures can cascade from enterprise IT into patient-facing operations. This post unpacks what the incident reveals about concentration risk, vendor dependencies, and real-world impact.
Blog
Laptop pricing predictability just broke. After years of flat to declining prices, clients are seeing increases in laptop prices of 10%–15% or more. This is bad news for CIOs managing this year’s laptop refresh cycle. There are two primary drivers of these cost increases: 1) Windows 10’s end of life has caused many enterprises to […]
Blog
AI represents an unparalleled opportunity to drive innovation, efficiency, and scale. But it isn’t a shortcut to progress — rather, it’s a stress test for leadership clarity.
Blog
India’s misselling problem is no longer being treated as a training lapse or “rogue agent” issue. The Finance Minister has publicly stated that misselling is an offence: not a training failure, not a rogue agent problem — an offence, with institutional accountability attached and welcomed, tighter Reserve Bank of India (RBI) guidance. RBI’s responsible business […]
Blog
I’ve spent much of my career as both an analyst and a practitioner advising people against “the big rewrite.” It’s called second-system syndrome for a reason: You usually throw away years of hidden bug fixes and security patches just for the sake of “cleaner” code. But after sitting down with Cloudflare’s Dane Knecht (CTO) and […]
Blog
This blog examines how the alleged Stryker cyberattack underscores a critical blind spot in enterprise resilience strategies: the outsized risk and impact of compromised device and endpoint management platforms.
Blog
Leading Through War-Driven Chaos The last few years have been defined by compounding uncertainty. From the COVID‑19 pandemic to the 2025 US tariff escalations, along with the ongoing war in Ukraine now entering its fourth year, enterprise leaders have had to navigate relentless geopolitical and economic pressure. These shocks forced organizations to strengthen their scenario […]
Blog
Sales compensation should drive performance, not complexity. The most effective plans keep structures simple and align roles to revenue motions such as new business, expansion, and renewals while supporting clear coverage models and interlocking sales roles. When compensation is easy to understand, administer, and scale, sellers focus on revenue instead of deciphering pay mechanics. Simple, transparent plans build trust, retain top performers, and attract the best sales talent in the market.
Blog
On Friday, March 6, the Trump administration released the latest US national cybersecurity strategy, President Trump’s Cyber Strategy for America, alongside an executive order on combating cybercrime and fraud. The document, focused on six core pillars, is the briefest cybersecurity strategy released by the US in the last decade. The biggest challenge with the document […]
Blog
Fraud management and anti-money laundering (AML) solutions share common traits and requirements: Both are about risk scoring of entities (names, phone numbers, email addresses, accounts) and routing and investigating alerts and cases to AI agents and human investigators. While smaller, regional financial institutions (FIs) and insurers have always been motivated to consolidate tools and resources […]
Blog
The Forrester Wave™: Cybersecurity Skills And Training Platforms, Q1 2026 is now live, and it lands at a moment when security leaders are under real pressure to prove readiness and resilience. Automation and AI have compressed attacker timelines, blurred role boundaries across security teams, and exposed the limits of certification-first training models. What matters now […]
Blog
2025 was another year defined by massive data breaches and privacy fines, with over 10.6 billion records exposed and nearly $2.8 billion in penalties among the year’s most notable incidents. In our newest report, Lessons Learned From The World’s Biggest Data Breaches And Privacy Abuses, 2025, we analyzed the top 35 breaches and most notable […]
Blog
AI took center stage at Reltio DataDriven 2026, where global data and AI leaders aligned on one urgent priority: turning trusted, real-time, contextual data into scalable AI and measurable business impact. Reltio made a clear strategic bet: The next enterprise AI bottleneck isn’t model choice or orchestration but shared context — rebranding its platform around […]
Blog
What do the Monopoly man’s monocle, the Fruit of the Loom cornucopia, and “Luke, I am your father” have in common? None of them actually exist the way you remember. That glitch is the Mandela effect, a collective misremembering of facts or events, and it is the same mental bug that convinces executives that their […]
Blog
Traditional service desk models fail to deliver strategic value in today’s digital-first organizations. Discover why IT leaders must reimagine service desks as product teams focused on business outcomes rather than ticket metrics and learn the practical steps required to make the transformation a reality.
Blog
In February 2025, Dutch telecom operator Odido disclosed a breach affecting 6.2 million current and former customers (roughly a third of the country’s population), the largest telecom breach in Dutch history. Attackers socially engineered a call center employee into approving a fraudulent MFA request, gaining access to Odido’s Salesforce CRM environment and exfiltrating highly sensitive data […]
Blog
As code becomes cheap and abundant, software vendors must rethink what customers actually pay for. Durable differentiation shifts from features to outcomes, expertise, and trust.