Paddy Harrington
Senior Analyst
Speaking At
Author Insights
Blog
Concerned About AI Gathering Business Data? Check Your Phone.
The range of threats targeting mobile devices is extensive, and as AI is integrated into more applications and platforms, security pros will need to implement more controls to reduce risk.
Blog
Why Attack The Front Door If The Mobile Side Door Is Open?
When it comes to mobile device security, barely half of organizations are using unified endpoint management (UEM). That’s like locking the front door and leaving the side door wide open. Find out why security teams overlook mobile devices in this preview of our upcoming Security & Risk Summit.
Blog
That’s A Nice IoT Device You’ve Got There … It’d Be A Shame If Mirai Used It For Its Botnet
A variant of the Mirai DDoS botnet that arrived in late 2016 and has remained active (because its creators released the malware for anyone to use) is using unpatched (and, in this case, unpatchable) AVTECH closed-circuit television cameras as part of its botnet to attack targets of opportunity, such as an early target of the […]
Blog
The Shakedown From Black Hat USA, 2024
What happens when five security analysts gather at a security conference in Las Vegas? Stuff gets broke. Find out more in this review of the recent BlackHat USA event.
Blog
A Recent Issue Highlights The Importance Of Securing The Hypervisor
Learn how applying Zero Trust, identity and access management, and endpoint detection and response (EDR) can help protect VMware’s ESXi hypervisor from a newly exploited vulnerability.
Blog
Even Greener Pastures Have Their Own Manure
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
Blog
CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog
Announcing The Forrester Wave™: Mobile Threat Defense Solutions, Q3 2024
Learn three emerging trends in mobile security in this preview of our new Wave report on mobile threat defense systems.
Blog
Securing IoT Devices Demands Applying Zero Trust Principles
Two recent sets of vulnerabilities discovered in medical IoT devices highlight the importance of implementing Zero Trust principles when deploying IoT devices. Learn more in this post.
Blog
Crashing Through The Walls Of Your Enterprise, Modern Cars Are Leaving Security Gaps
As organizations implement more security controls on existing applications and devices, attackers are looking for the next target of opportunity. Lax security makes connected vehicles a new vector of potential compromise. Learn more in this preview of a new report.
Blog
Intel Bets On AI Everywhere And Demand For Smaller, Targeted LLMs
Tech leaders are rethinking their strategic partnerships, because silicon matters again. That's why so much attention was paid to this year's Intel Vision conference. Get our key takeaways from the event including three intriguing Intel product announcements.
Blog
You Got Your Carbon Black In My Symantec! No, You Got Your Symantec In My Carbon Black!
What is Broadcom planning to do with VMware’s Carbon Black unit? Find out in this blog covering the plan to integrate Carbon Black with Broadcom's existing product lineup.
Blog
Prescription For Change: Cybersecurity Outage Highlights Critical Vulnerabilities In Healthcare
A recent cybersecurity incident at Change Healthcare cause the pharmacy claims processors to take its systems offline. Learn the implication of this event and five things firms can do to prepare.
Blog
A New Dawn For VMware EUC And Carbon Black, But Not Without Risk
Find out how Broadcom's plan to divest VMware’s EUC And Carbon Black businesses could impact customers and the market overall.
Blog
VMware Customers: Brace For Impact
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog
Tremors Originating From A California Ripple In The Enterprise Browser Market
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog
Announcing The Forrester Wave™: Endpoint Security, Q4 2023
Learn three key trends currently driving the endpoint security market in a preview of the new Wave report on endpoint security.
Blog
Address IoT Security Before Your Organization Winds Up In The Headlines
What does car repair have to do with IoT security strategies? Find out.
Blog
Don’t Ignore Your Employee Offboarding Processes
How offboarding is handled not only impacts your organization directly — it can also have a lasting effect on how others perceive your organization. Our two latest reports can help leaders mitigate the risks.
Blog
Vehicle Security: Making Sure K.I.T.T. Doesn’t Become K.A.R.R.
We ended 2022 with the announcement of a vulnerability within SiriusXM Connected Vehicle Services, which has a broad impact because of the ubiquity of these units. In 2023 the vehicle-related software vulnerabilities just keep on coming, this time within API endpoints used by vehicles’ telematics systems, an issue with a wide impact across 16 different […]
More posts