Paddy Harrington
Senior Analyst
![](https://go.forrester.com/wp-content/uploads/2022/03/Paddy-Harrington-640x480.jpg)
Author Insights
Blog
CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog
Announcing The Forrester Wave™: Mobile Threat Defense Solutions, Q3 2024
Learn three emerging trends in mobile security in this preview of our new Wave report on mobile threat defense systems.
Blog
Securing IoT Devices Demands Applying Zero Trust Principles
Two recent sets of vulnerabilities discovered in medical IoT devices highlight the importance of implementing Zero Trust principles when deploying IoT devices. Learn more in this post.
Blog
Crashing Through The Walls Of Your Enterprise, Modern Cars Are Leaving Security Gaps
As organizations implement more security controls on existing applications and devices, attackers are looking for the next target of opportunity. Lax security makes connected vehicles a new vector of potential compromise. Learn more in this preview of a new report.
Blog
Intel Bets On AI Everywhere And Demand For Smaller, Targeted LLMs
Tech leaders are rethinking their strategic partnerships, because silicon matters again. That's why so much attention was paid to this year's Intel Vision conference. Get our key takeaways from the event including three intriguing Intel product announcements.
Blog
You Got Your Carbon Black In My Symantec! No, You Got Your Symantec In My Carbon Black!
What is Broadcom planning to do with VMware’s Carbon Black unit? Find out in this blog covering the plan to integrate Carbon Black with Broadcom's existing product lineup.
Blog
Prescription For Change: Cybersecurity Outage Highlights Critical Vulnerabilities In Healthcare
A recent cybersecurity incident at Change Healthcare cause the pharmacy claims processors to take its systems offline. Learn the implication of this event and five things firms can do to prepare.
Blog
A New Dawn For VMware EUC And Carbon Black, But Not Without Risk
Find out how Broadcom's plan to divest VMware’s EUC And Carbon Black businesses could impact customers and the market overall.
Blog
VMware Customers: Brace For Impact
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog
Tremors Originating From A California Ripple In The Enterprise Browser Market
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog
Announcing The Forrester Wave™: Endpoint Security, Q4 2023
Learn three key trends currently driving the endpoint security market in a preview of the new Wave report on endpoint security.
Blog
Address IoT Security Before Your Organization Winds Up In The Headlines
What does car repair have to do with IoT security strategies? Find out.
Blog
Don’t Ignore Your Employee Offboarding Processes
How offboarding is handled not only impacts your organization directly — it can also have a lasting effect on how others perceive your organization. Our two latest reports can help leaders mitigate the risks.
Blog
Vehicle Security: Making Sure K.I.T.T. Doesn’t Become K.A.R.R.
We ended 2022 with the announcement of a vulnerability within SiriusXM Connected Vehicle Services, which has a broad impact because of the ubiquity of these units. In 2023 the vehicle-related software vulnerabilities just keep on coming, this time within API endpoints used by vehicles’ telematics systems, an issue with a wide impact across 16 different […]
Blog
Enterprise Browsers Reignite The Browser Wars But This Time For Businesses
I’ve been in the IT industry long enough to remember the start of the “browser wars,” when Internet Explorer took on Netscape in the late 1990s. Product names such as Mosaic, Netscape, “IE,” and Mozilla (and its next iteration with Firefox) were all part of the browser market development. Safari came along for Mac in […]
Blog
The Challenges With Securing The Anywhere-Work Endpoint
Learn how endpoint security has been impacted by the more to anywhere work and what steps security pros can take in this preview of the Security & Risk event.
Blog
Choose Apple Lockdown Mode, Choose Security
Users get to make their own choices about security and privacy when using Apple devices, not carriers, application developers, or advertisers.
Blog
The Pros And Cons Of Connected Devices
In May 2022, Business Insider reported that Russian troops stole nearly $5 million worth of farm equipment from a John Deere dealership in Melitopol, Ukraine. The stolen equipment was located by remote GPS and locked, preventing it from being used. This story opens many questions around IoT security and is a path of research that […]
Blog
VMware Customers: Get Ready For Broadcom Disruption
Late Sunday evening, Bloomberg reported rumors of advanced Broadcom talks to acquire VMware, which has since been confirmed this morning. In light of Broadcom’s investment activities in the past few years, this news is unsurprising. It made a string of massively expensive enterprise software company acquisitions: Brocade Communications Systems in 2016 ($5.9 billion), CA Technologies […]
Blog
Insteon And The Internet Of Bricks
Last month, smart home provider Insteon appears to have shut down, rendering the Insteon hubs inoperable. Users were unable to control their IoT devices connected to the Insteon hub, such as smart lighting and appliances. The culprit appears to not be malicious malware but rather financial circumstances that have caused the company to cease operations. […]
More posts