Paddy Harrington
Senior Analyst

Author Insights
Blog
The Akira IoT Device Attacks Aren’t Just About THAT Device
Securing IoT devices presents unique challenges due to their proprietary operating systems and firmware, which often preclude traditional endpoint protection methods. This blog explores the critical role of network segmentation and Zero Trust principles in mitigating risks, emphasizing the importance of robust edge, network, and gateway security measures to defend against sophisticated attacks such as the Androxgh0st botnet and Akira ransomware.
Blog
Detect, Defend, Deny: Zero Trust World 2025
Cybersecurity vendor ThreatLocker recently hosted its fifth annual Zero Trust World (ZTW) conference in Orlando, welcoming attendees from 28 countries to learn about Zero Trust principles and ThreatLocker offerings. Over two days, the event celebrated Zero Trust as a cybersecurity model and the ThreatLocker approach for achieving Zero Trust. Industry leaders, managed service providers, security […]
Blog
Highlights And Implications Of Biden’s Executive Order On Strengthening And Promoting Innovation In The Nation’s Cybersecurity
Forrester's security and risk research team breaks down the key highlights and implications of former US President Joe Biden’s 2025 Executive Order (EO) 14144 on strengthening security, improving accountability for software and cloud service providers, and promoting innovation, including use of emerging technologies.
Blog
Some Good News In The World Of IoT Security: The FCC Launches The US Cyber Trust Mark Program
The US government is doing something positive around IoT security. With the launch of the US Cyber Trust Mark program, the Federal Communications Commission (FCC) authorized a program and developed rules that bring forward a voluntary labeling standard.
Blog
Your Car Is Listening To You — And So Are Hackers
Skoda and Volkswagen are the latest vehicle manufacturers that have had vulnerabilities discovered in their cars that could allow malicious actors to execute code remotely. Find out more about privacy risks in cars and what can be done to minimize them.
Blog
Warning: The Mobile Endpoint In Your Pocket May Be Just As Vulnerable As Your Desktop
Learn why the Android OS can be just as vulnerable to attacks as Windows and what steps you can take to minimize the risk.
Blog
Concerned About AI Gathering Business Data? Check Your Phone.
The range of threats targeting mobile devices is extensive, and as AI is integrated into more applications and platforms, security pros will need to implement more controls to reduce risk.
Blog
Why Attack The Front Door If The Mobile Side Door Is Open?
When it comes to mobile device security, barely half of organizations are using unified endpoint management (UEM). That’s like locking the front door and leaving the side door wide open. Find out why security teams overlook mobile devices in this preview of our upcoming Security & Risk Summit.
Blog
That’s A Nice IoT Device You’ve Got There … It’d Be A Shame If Mirai Used It For Its Botnet
A variant of the Mirai DDoS botnet that arrived in late 2016 and has remained active (because its creators released the malware for anyone to use) is using unpatched (and, in this case, unpatchable) AVTECH closed-circuit television cameras as part of its botnet to attack targets of opportunity, such as an early target of the […]
Blog
The Shakedown From Black Hat USA, 2024
What happens when five security analysts gather at a security conference in Las Vegas? Stuff gets broke. Find out more in this review of the recent BlackHat USA event.
Blog
A Recent Issue Highlights The Importance Of Securing The Hypervisor
Learn how applying Zero Trust, identity and access management, and endpoint detection and response (EDR) can help protect VMware’s ESXi hypervisor from a newly exploited vulnerability.
Blog
Even Greener Pastures Have Their Own Manure
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
Blog
CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog
Announcing The Forrester Wave™: Mobile Threat Defense Solutions, Q3 2024
Learn three emerging trends in mobile security in this preview of our new Wave report on mobile threat defense systems.
Blog
Securing IoT Devices Demands Applying Zero Trust Principles
Two recent sets of vulnerabilities discovered in medical IoT devices highlight the importance of implementing Zero Trust principles when deploying IoT devices. Learn more in this post.
Blog
Crashing Through The Walls Of Your Enterprise, Modern Cars Are Leaving Security Gaps
As organizations implement more security controls on existing applications and devices, attackers are looking for the next target of opportunity. Lax security makes connected vehicles a new vector of potential compromise. Learn more in this preview of a new report.
Blog
Intel Bets On AI Everywhere And Demand For Smaller, Targeted LLMs
Tech leaders are rethinking their strategic partnerships, because silicon matters again. That's why so much attention was paid to this year's Intel Vision conference. Get our key takeaways from the event including three intriguing Intel product announcements.
Blog
You Got Your Carbon Black In My Symantec! No, You Got Your Symantec In My Carbon Black!
What is Broadcom planning to do with VMware’s Carbon Black unit? Find out in this blog covering the plan to integrate Carbon Black with Broadcom's existing product lineup.
Blog
Prescription For Change: Cybersecurity Outage Highlights Critical Vulnerabilities In Healthcare
A recent cybersecurity incident at Change Healthcare cause the pharmacy claims processors to take its systems offline. Learn the implication of this event and five things firms can do to prepare.
Blog
A New Dawn For VMware EUC And Carbon Black, But Not Without Risk
Find out how Broadcom's plan to divest VMware’s EUC And Carbon Black businesses could impact customers and the market overall.
More posts