Paddy Harrington

Senior Analyst

Forrester Bio

Author Insights

Blog

VMware Customers: Brace For Impact

Tracy Woo November 22, 2023
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog

Tremors Originating From A California Ripple In The Enterprise Browser Market

Paddy Harrington November 9, 2023
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog

Announcing The Forrester Wave™: Endpoint Security, Q4 2023

Paddy Harrington October 27, 2023
Learn three key trends currently driving the endpoint security market in a preview of the new Wave report on endpoint security.
Blog

Address IoT Security Before Your Organization Winds Up In The Headlines

Paddy Harrington October 17, 2023
What does car repair have to do with IoT security strategies? Find out.
Blog

Don’t Ignore Your Employee Offboarding Processes

Paddy Harrington April 4, 2023
How offboarding is handled not only impacts your organization directly — it can also have a lasting effect on how others perceive your organization. Our two latest reports can help leaders mitigate the risks.
Blog

Vehicle Security: Making Sure K.I.T.T. Doesn’t Become K.A.R.R.

Paddy Harrington February 2, 2023
We ended 2022 with the announcement of a vulnerability within SiriusXM Connected Vehicle Services, which has a broad impact because of the ubiquity of these units. In 2023 the vehicle-related software vulnerabilities just keep on coming, this time within API endpoints used by vehicles’ telematics systems, an issue with a wide impact across 16 different […]
Blog

Enterprise Browsers Reignite The Browser Wars But This Time For Businesses

Paddy Harrington November 4, 2022
I’ve been in the IT industry long enough to remember the start of the “browser wars,” when Internet Explorer took on Netscape in the late 1990s. Product names such as Mosaic, Netscape, “IE,” and Mozilla (and its next iteration with Firefox) were all part of the browser market development. Safari came along for Mac in […]
Blog

The Challenges With Securing The Anywhere-Work Endpoint

Paddy Harrington August 19, 2022
Learn how endpoint security has been impacted by the more to anywhere work and what steps security pros can take in this preview of the Security & Risk event.
Blog

Choose Apple Lockdown Mode, Choose Security

Paddy Harrington July 12, 2022
Users get to make their own choices about security and privacy when using Apple devices, not carriers, application developers, or advertisers.
Blog

The Pros And Cons Of Connected Devices

Paddy Harrington July 8, 2022
In May 2022, Business Insider reported that Russian troops stole nearly $5 million worth of farm equipment from a John Deere dealership in Melitopol, Ukraine. The stolen equipment was located by remote GPS and locked, preventing it from being used. This story opens many questions around IoT security and is a path of research that […]
Blog

VMware Customers: Get Ready For Broadcom Disruption

Tracy Woo May 26, 2022
Late Sunday evening, Bloomberg reported rumors of advanced Broadcom talks to acquire VMware, which has since been confirmed this morning. In light of Broadcom’s investment activities in the past few years, this news is unsurprising. It made a string of massively expensive enterprise software company acquisitions: Brocade Communications Systems in 2016 ($5.9 billion), CA Technologies […]
Blog

Insteon And The Internet Of Bricks

Merritt Maxim May 10, 2022
Last month, smart home provider Insteon appears to have shut down, rendering the Insteon hubs inoperable. Users were unable to control their IoT devices connected to the Insteon hub, such as smart lighting and appliances. The culprit appears to not be malicious malware but rather financial circumstances that have caused the company to cease operations. […]
Blog

Meet The New Endpoint Security And IoT Security Analyst: Paddy Harrington

Paddy Harrington March 1, 2022
Tell us about yourself! I’ve spent the last 25-plus years in the end user computing space — the world of connecting end users to their applications and data. My teenage hobby of computers has turned into my career, with my initial education in aeronautics. Whether it was seeing “WarGames” when it first came out, “hacking” […]