Paddy Harrington

Senior Analyst

Forrester Bio

Author Insights

Blog

Ongoing Government Uncertainty Around Cybersecurity Initiatives Is Putting Your Business At Risk

Paddy Harrington 7 days ago
Government instability is undermining key cybersecurity programs like CyberSentry and MITRE’s CVE cataloging, putting critical infrastructure and business operations at risk. This post explores how funding cuts and conflicting AI directives are creating dangerous gaps in threat detection and response.
Blog

Black Hat 2025: Troop Forrester Goes To Hacker Summer Camp

James Plouffe August 13, 2025
2025 marks the 28th year of Black Hat, and although it remains on the edgier side of corporate-focused cybersecurity conferences, it sometimes feels like the event is considering completely ditching its hoodie in favor of a collared shirt.
Blog

Black Or Blue, Microsoft’s Quick Machine Recovery Might Be Able To Soften That Bruise

Paddy Harrington August 11, 2025
Windows 11’s new Quick Machine Recovery and kernel-space security changes mark a turning point in enterprise resilience. As Windows 10 nears retirement, these features offer IT leaders compelling reasons to upgrade beyond just compliance.
Blog

You Don’t Need To Be Ethan Hunt To Break Into A Building

Paddy Harrington June 17, 2025
In today’s hyper-connected buildings, cybercriminals don’t need grappling hooks or disguises — just a vulnerable thermostat or door lock to breach your defenses and disrupt your operations.
Blog

When You Can’t Change The Technology, Change Your Security Policies

Paddy Harrington June 11, 2025
When you can’t change the security of external technologies such as IoT, OT, or power infrastructure, you must adapt your internal cybersecurity policies and controls to mitigate the risks that they introduce.
Blog

Sudo Coming To Windows? Pretty Much, Yeah

Paddy Harrington May 29, 2025
Windows 11 introduces a new security feature that separates admin and user roles, bringing a sudolike experience to the desktop.
Blog

IoT, IIoT, IoMT, And OT — Welcome To Acronym Mania. What Does It All Mean?

Paddy Harrington April 3, 2025
In the world of autonomous endpoints, we are dealing with five primary acronyms. To clarify the meaning of these acronyms, here is some guidance and perspective.
Blog

Takeaways From HIMSS25: Embrace Collaboration, Change, And Cybersecurity

Arielle Trzcinski March 17, 2025
Collaboration emerged as a key theme for unlocking the power of emerging technology and tackling tough challenges for healthcare at the Healthcare Information and Management Systems Society (HIMSS) annual conference for 2025. Get more of our key takeaways here.
Blog

The Akira IoT Device Attacks Aren’t Just About THAT Device

Paddy Harrington March 12, 2025
Securing IoT devices presents unique challenges due to their proprietary operating systems and firmware, which often preclude traditional endpoint protection methods. This blog explores the critical role of network segmentation and Zero Trust principles in mitigating risks, emphasizing the importance of robust edge, network, and gateway security measures to defend against sophisticated attacks such as the Androxgh0st botnet and Akira ransomware.
Blog

Detect, Defend, Deny: Zero Trust World 2025

Jitin Shabadu February 27, 2025
Cybersecurity vendor ThreatLocker recently hosted its fifth annual Zero Trust World (ZTW) conference in Orlando, welcoming attendees from 28 countries to learn about Zero Trust principles and ThreatLocker offerings. Over two days, the event celebrated Zero Trust as a cybersecurity model and the ThreatLocker approach for achieving Zero Trust. Industry leaders, managed service providers, security […]
Blog

Highlights And Implications Of Biden’s Executive Order On Strengthening And Promoting Innovation In The Nation’s Cybersecurity

Heidi Shey January 21, 2025
Forrester's security and risk research team breaks down the key highlights and implications of former US President Joe Biden’s 2025 Executive Order (EO) 14144 on strengthening security, improving accountability for software and cloud service providers, and promoting innovation, including use of emerging technologies.
Blog

Some Good News In The World Of IoT Security: The FCC Launches The US Cyber Trust Mark Program

Paddy Harrington January 16, 2025
The US government is doing something positive around IoT security. With the launch of the US Cyber Trust Mark program, the Federal Communications Commission (FCC) authorized a program and developed rules that bring forward a voluntary labeling standard.
Blog

Your Car Is Listening To You — And So Are Hackers

Paddy Harrington December 18, 2024
Skoda and Volkswagen are the latest vehicle manufacturers that have had vulnerabilities discovered in their cars that could allow malicious actors to execute code remotely. Find out more about privacy risks in cars and what can be done to minimize them.
Blog

Warning: The Mobile Endpoint In Your Pocket May Be Just As Vulnerable As Your Desktop

Paddy Harrington December 5, 2024
Learn why the Android OS can be just as vulnerable to attacks as Windows and what steps you can take to minimize the risk.
Blog

Concerned About AI Gathering Business Data? Check Your Phone.

Paddy Harrington September 25, 2024
The range of threats targeting mobile devices is extensive, and as AI is integrated into more applications and platforms, security pros will need to implement more controls to reduce risk.
Blog

Why Attack The Front Door If The Mobile Side Door Is Open?

Paddy Harrington September 19, 2024
When it comes to mobile device security, barely half of organizations are using unified endpoint management (UEM). That’s like locking the front door and leaving the side door wide open. Find out why security teams overlook mobile devices in this preview of our upcoming Security & Risk Summit.
Blog

That’s A Nice IoT Device You’ve Got There … It’d Be A Shame If Mirai Used It For Its Botnet

Paddy Harrington September 16, 2024
A variant of the Mirai DDoS botnet that arrived in late 2016 and has remained active (because its creators released the malware for anyone to use) is using unpatched (and, in this case, unpatchable) AVTECH closed-circuit television cameras as part of its botnet to attack targets of opportunity, such as an early target of the […]
Blog

The Shakedown From Black Hat USA, 2024

Sandy Carielli August 14, 2024
What happens when five security analysts gather at a security conference in Las Vegas? Stuff gets broke. Find out more in this review of the recent BlackHat USA event.
Blog

A Recent Issue Highlights The Importance Of Securing The Hypervisor

Paddy Harrington August 8, 2024
Learn how applying Zero Trust, identity and access management, and endpoint detection and response (EDR) can help protect VMware’s ESXi hypervisor from a newly exploited vulnerability.
Blog

Even Greener Pastures Have Their Own Manure

Paddy Harrington July 31, 2024
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
More posts