Paddy Harrington
Senior Analyst
Author Insights
Blog
CrowdStrike’s Planned Acquisition Of Seraphic Highlights The Need To Address Endpoint Risks
CrowdStrike’s move to acquire Seraphic spotlights a growing blind spot in cybersecurity: The browser has quietly become one of the riskiest — and least protected — endpoints in the enterprise. This blog reveals why legacy EDR, XDR, and network tools can’t see what’s really happening inside the browser and how Seraphic’s unique JSE‑based approach could change the game for data protection and threat detection.
Blog
One Way To Close Your Security Gap: Stop Running As Admin On Windows Daily
While enterprise security has advanced, many organizations still leave a major vulnerability in place by letting employees run with local admin rights on Windows devices. This blog goes over ways to close that vulnerability gap.
Hear more from Paddy Harrington
Upcoming Events
Check back soon for upcoming events.Upcoming Webinars
OnDemand Webinars
Check back soon for on-demand webinarsBlog
ServiceNow Buys Armis To Improve Its Proactive Security Platform
ServiceNow has announced its intent to acquire proactive security platform vendor Armis in a cash deal valued at $7.75 billion.
Blog
Tanium Converge 2025: Strategy Shifts Beyond Endpoint Management To Autonomous IT
At Tanium Converge 2025 in Orlando, Florida, Tanium CEO Dan Streetman kicked things off by highlighting Tanium’s strategy shift — extending beyond managing and securing endpoints to delivering autonomous IT platform solutions. During onstage and breakout sessions, enterprises including AutoNation, Best Buy, McDonald’s, and UKG highlighted how they used Tanium solutions to unify management and […]
Blog
MITRE ATT&CK Evaluations Return: More Coverage, More Nuance
There were many big changes in this latest round. Read our breakdown and what we learned.
Blog
You Know Who’s In The Building — But Who’s In Your Network?
Strong physical security is standard in critical infrastructure — but OT networks often remain wide open. This blog explores how applying Zero Trust principles can help you control digital access with the same rigor you apply to physical visitors.
Blog
Predictions 2026: Cybersecurity And Risk Leaders Grapple With New Tech And Geopolitical Threats
In 2026, continued political instability coupled with technological advancements being used by cybercriminals will force cybersecurity and risk leaders to adapt their defensive technologies and prepare their workforce for big shifts. Find out more in our 2026 predictions for cybersecurity and risk.
Blog
CrowdStrike Fal.Con 2025: Flexing Into The Agentic AI Age
CrowdStrike held its Fal.Con 2025 conference recently and not surprisingly for a cybersecurity vendor event in 2025, AI dominated. Get our highlights and key takeaways here.
Blog
The Abyss Of The Salesloft-Salesforce Breach May Reach The Challenger Deep
Details have been trickling out about a security issue in Salesloft’s Drift product. Find out what data was compromised and what actions you can take to reduce the threat to your business.
Blog
Announcing The Forrester Wave™: IoT Security Solutions, Q3 2025
IoT devices are a normal part of business and personal life. In enterprises, it is estimated that there are between six and 10 IoT devices for each employee, ranging from long-standing devices, such as printers and cameras, and industry-specific devices like warehouse scanners and medical infusion pumps to modern air quality monitors and soil moisture […]
Blog
Ongoing Government Uncertainty Around Cybersecurity Initiatives Is Putting Your Business At Risk
Government instability is undermining key cybersecurity programs like CyberSentry and MITRE’s CVE cataloging, putting critical infrastructure and business operations at risk. This post explores how funding cuts and conflicting AI directives are creating dangerous gaps in threat detection and response.
Blog
Black Hat 2025: Troop Forrester Goes To Hacker Summer Camp
2025 marks the 28th year of Black Hat, and although it remains on the edgier side of corporate-focused cybersecurity conferences, it sometimes feels like the event is considering completely ditching its hoodie in favor of a collared shirt.
Blog
Black Or Blue, Microsoft’s Quick Machine Recovery Might Be Able To Soften That Bruise
Windows 11’s new Quick Machine Recovery and kernel-space security changes mark a turning point in enterprise resilience. As Windows 10 nears retirement, these features offer IT leaders compelling reasons to upgrade beyond just compliance.
Blog
You Don’t Need To Be Ethan Hunt To Break Into A Building
In today’s hyper-connected buildings, cybercriminals don’t need grappling hooks or disguises — just a vulnerable thermostat or door lock to breach your defenses and disrupt your operations.
Blog
When You Can’t Change The Technology, Change Your Security Policies
When you can’t change the security of external technologies such as IoT, OT, or power infrastructure, you must adapt your internal cybersecurity policies and controls to mitigate the risks that they introduce.
Blog
Sudo Coming To Windows? Pretty Much, Yeah
Windows 11 introduces a new security feature that separates admin and user roles, bringing a sudolike experience to the desktop.
Blog
IoT, IIoT, IoMT, And OT — Welcome To Acronym Mania. What Does It All Mean?
In the world of autonomous endpoints, we are dealing with five primary acronyms. To clarify the meaning of these acronyms, here is some guidance and perspective.
Blog
Takeaways From HIMSS25: Embrace Collaboration, Change, And Cybersecurity
Collaboration emerged as a key theme for unlocking the power of emerging technology and tackling tough challenges for healthcare at the Healthcare Information and Management Systems Society (HIMSS) annual conference for 2025. Get more of our key takeaways here.
Blog
The Akira IoT Device Attacks Aren’t Just About THAT Device
Securing IoT devices presents unique challenges due to their proprietary operating systems and firmware, which often preclude traditional endpoint protection methods. This blog explores the critical role of network segmentation and Zero Trust principles in mitigating risks, emphasizing the importance of robust edge, network, and gateway security measures to defend against sophisticated attacks such as the Androxgh0st botnet and Akira ransomware.
Blog
Detect, Defend, Deny: Zero Trust World 2025
Cybersecurity vendor ThreatLocker recently hosted its fifth annual Zero Trust World (ZTW) conference in Orlando, welcoming attendees from 28 countries to learn about Zero Trust principles and ThreatLocker offerings. Over two days, the event celebrated Zero Trust as a cybersecurity model and the ThreatLocker approach for achieving Zero Trust. Industry leaders, managed service providers, security […]
More posts