Paddy Harrington
Senior Analyst

Author Insights
Blog
VMware Customers: Brace For Impact
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog
Tremors Originating From A California Ripple In The Enterprise Browser Market
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog
Announcing The Forrester Wave™: Endpoint Security, Q4 2023
Learn three key trends currently driving the endpoint security market in a preview of the new Wave report on endpoint security.
Blog
Address IoT Security Before Your Organization Winds Up In The Headlines
What does car repair have to do with IoT security strategies? Find out.
Blog
Don’t Ignore Your Employee Offboarding Processes
How offboarding is handled not only impacts your organization directly — it can also have a lasting effect on how others perceive your organization. Our two latest reports can help leaders mitigate the risks.
Blog
Vehicle Security: Making Sure K.I.T.T. Doesn’t Become K.A.R.R.
We ended 2022 with the announcement of a vulnerability within SiriusXM Connected Vehicle Services, which has a broad impact because of the ubiquity of these units. In 2023 the vehicle-related software vulnerabilities just keep on coming, this time within API endpoints used by vehicles’ telematics systems, an issue with a wide impact across 16 different […]
Blog
Enterprise Browsers Reignite The Browser Wars But This Time For Businesses
I’ve been in the IT industry long enough to remember the start of the “browser wars,” when Internet Explorer took on Netscape in the late 1990s. Product names such as Mosaic, Netscape, “IE,” and Mozilla (and its next iteration with Firefox) were all part of the browser market development. Safari came along for Mac in […]
Blog
The Challenges With Securing The Anywhere-Work Endpoint
Learn how endpoint security has been impacted by the more to anywhere work and what steps security pros can take in this preview of the Security & Risk event.
Blog
Choose Apple Lockdown Mode, Choose Security
Users get to make their own choices about security and privacy when using Apple devices, not carriers, application developers, or advertisers.
Blog
The Pros And Cons Of Connected Devices
In May 2022, Business Insider reported that Russian troops stole nearly $5 million worth of farm equipment from a John Deere dealership in Melitopol, Ukraine. The stolen equipment was located by remote GPS and locked, preventing it from being used. This story opens many questions around IoT security and is a path of research that […]
Blog
VMware Customers: Get Ready For Broadcom Disruption
Late Sunday evening, Bloomberg reported rumors of advanced Broadcom talks to acquire VMware, which has since been confirmed this morning. In light of Broadcom’s investment activities in the past few years, this news is unsurprising. It made a string of massively expensive enterprise software company acquisitions: Brocade Communications Systems in 2016 ($5.9 billion), CA Technologies […]
Blog
Insteon And The Internet Of Bricks
Last month, smart home provider Insteon appears to have shut down, rendering the Insteon hubs inoperable. Users were unable to control their IoT devices connected to the Insteon hub, such as smart lighting and appliances. The culprit appears to not be malicious malware but rather financial circumstances that have caused the company to cease operations. […]
Blog
Meet The New Endpoint Security And IoT Security Analyst: Paddy Harrington
Tell us about yourself! I’ve spent the last 25-plus years in the end user computing space — the world of connecting end users to their applications and data. My teenage hobby of computers has turned into my career, with my initial education in aeronautics. Whether it was seeing “WarGames” when it first came out, “hacking” […]