Paddy Harrington

Senior Analyst

Forrester Bio

Author Insights

Blog

CrowdStrike’s Planned Acquisition Of Seraphic Highlights The Need To Address Endpoint Risks

Paddy Harrington 6 days ago
CrowdStrike’s move to acquire Seraphic spotlights a growing blind spot in cybersecurity: The browser has quietly become one of the riskiest — and least protected — endpoints in the enterprise. This blog reveals why legacy EDR, XDR, and network tools can’t see what’s really happening inside the browser and how Seraphic’s unique JSE‑based approach could change the game for data protection and threat detection.
Blog

One Way To Close Your Security Gap: Stop Running As Admin On Windows Daily

Paddy Harrington January 15, 2026
While enterprise security has advanced, many organizations still leave a major vulnerability in place by letting employees run with local admin rights on Windows devices. This blog goes over ways to close that vulnerability gap.

Hear more from Paddy Harrington

Upcoming Events

Check back soon for upcoming events.

Upcoming Webinars

Predictions 2026 Webinar: Technology & Security

January 22, 2026

OnDemand Webinars

Check back soon for on-demand webinars
Blog

ServiceNow Buys Armis To Improve Its Proactive Security Platform

Erik Nost January 14, 2026
ServiceNow has announced its intent to acquire proactive security platform vendor Armis in a cash deal valued at $7.75 billion.
Blog

Tanium Converge 2025: Strategy Shifts Beyond Endpoint Management To Autonomous IT

Michele Pelino December 18, 2025
At Tanium Converge 2025 in Orlando, Florida, Tanium CEO Dan Streetman kicked things off by highlighting Tanium’s strategy shift — extending beyond managing and securing endpoints to delivering autonomous IT platform solutions. During onstage and breakout sessions, enterprises including AutoNation, Best Buy, McDonald’s, and UKG highlighted how they used Tanium solutions to unify management and […]
Blog

MITRE ATT&CK Evaluations Return: More Coverage, More Nuance

Allie Mellen December 10, 2025
There were many big changes in this latest round. Read our breakdown and what we learned.
Blog

You Know Who’s In The Building — But Who’s In Your Network?

Paddy Harrington October 9, 2025
Strong physical security is standard in critical infrastructure — but OT networks often remain wide open. This blog explores how applying Zero Trust principles can help you control digital access with the same rigor you apply to physical visitors.
Blog

Predictions 2026: Cybersecurity And Risk Leaders Grapple With New Tech And Geopolitical Threats

Paddy Harrington October 1, 2025
In 2026, continued political instability coupled with technological advancements being used by cybercriminals will force cybersecurity and risk leaders to adapt their defensive technologies and prepare their workforce for big shifts. Find out more in our 2026 predictions for cybersecurity and risk.
Blog

CrowdStrike Fal.Con 2025: Flexing Into The Agentic AI Age

Jitin Shabadu September 24, 2025
CrowdStrike held its Fal.Con 2025 conference recently and not surprisingly for a cybersecurity vendor event in 2025, AI dominated. Get our highlights and key takeaways here.
Blog

The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep

Paddy Harrington September 12, 2025
Details have been trickling out about a security issue in Salesloft’s Drift product. Find out what data was compromised and what actions you can take to reduce the threat to your business.
Blog

Announcing The Forrester Wave™: IoT Security Solutions, Q3 2025

Paddy Harrington September 10, 2025
IoT devices are a normal part of business and personal life. In enterprises, it is estimated that there are between six and 10 IoT devices for each employee, ranging from long-standing devices, such as printers and cameras, and industry-specific devices like warehouse scanners and medical infusion pumps to modern air quality monitors and soil moisture […]
Blog

Ongoing Government Uncertainty Around Cybersecurity Initiatives Is Putting Your Business At Risk

Paddy Harrington August 20, 2025
Government instability is undermining key cybersecurity programs like CyberSentry and MITRE’s CVE cataloging, putting critical infrastructure and business operations at risk. This post explores how funding cuts and conflicting AI directives are creating dangerous gaps in threat detection and response.
Blog

Black Hat 2025: Troop Forrester Goes To Hacker Summer Camp

James Plouffe August 13, 2025
2025 marks the 28th year of Black Hat, and although it remains on the edgier side of corporate-focused cybersecurity conferences, it sometimes feels like the event is considering completely ditching its hoodie in favor of a collared shirt.
Blog

Black Or Blue, Microsoft’s Quick Machine Recovery Might Be Able To Soften That Bruise

Paddy Harrington August 11, 2025
Windows 11’s new Quick Machine Recovery and kernel-space security changes mark a turning point in enterprise resilience. As Windows 10 nears retirement, these features offer IT leaders compelling reasons to upgrade beyond just compliance.
Blog

You Don’t Need To Be Ethan Hunt To Break Into A Building

Paddy Harrington June 17, 2025
In today’s hyper-connected buildings, cybercriminals don’t need grappling hooks or disguises — just a vulnerable thermostat or door lock to breach your defenses and disrupt your operations.
Blog

When You Can’t Change The Technology, Change Your Security Policies

Paddy Harrington June 11, 2025
When you can’t change the security of external technologies such as IoT, OT, or power infrastructure, you must adapt your internal cybersecurity policies and controls to mitigate the risks that they introduce.
Blog

Sudo Coming To Windows? Pretty Much, Yeah

Paddy Harrington May 29, 2025
Windows 11 introduces a new security feature that separates admin and user roles, bringing a sudolike experience to the desktop.
Blog

IoT, IIoT, IoMT, And OT — Welcome To Acronym Mania. What Does It All Mean?

Paddy Harrington April 3, 2025
In the world of autonomous endpoints, we are dealing with five primary acronyms. To clarify the meaning of these acronyms, here is some guidance and perspective.
Blog

Takeaways From HIMSS25: Embrace Collaboration, Change, And Cybersecurity

Arielle Trzcinski March 17, 2025
Collaboration emerged as a key theme for unlocking the power of emerging technology and tackling tough challenges for healthcare at the Healthcare Information and Management Systems Society (HIMSS) annual conference for 2025. Get more of our key takeaways here.
Blog

The Akira IoT Device Attacks Aren’t Just About THAT Device

Paddy Harrington March 12, 2025
Securing IoT devices presents unique challenges due to their proprietary operating systems and firmware, which often preclude traditional endpoint protection methods. This blog explores the critical role of network segmentation and Zero Trust principles in mitigating risks, emphasizing the importance of robust edge, network, and gateway security measures to defend against sophisticated attacks such as the Androxgh0st botnet and Akira ransomware.
Blog

Detect, Defend, Deny: Zero Trust World 2025

Jitin Shabadu February 27, 2025
Cybersecurity vendor ThreatLocker recently hosted its fifth annual Zero Trust World (ZTW) conference in Orlando, welcoming attendees from 28 countries to learn about Zero Trust principles and ThreatLocker offerings. Over two days, the event celebrated Zero Trust as a cybersecurity model and the ThreatLocker approach for achieving Zero Trust. Industry leaders, managed service providers, security […]
More posts