IoT security

IoT technologies come with ample opportunity . . . and considerable privacy and security risks. Read how your brand can develop IoT security practices that protect your customers and brand.

Discover how Forrester supports IT leaders.

Insights

Blog

Crashing Through The Walls Of Your Enterprise, Modern Cars Are Leaving Security Gaps

Paddy Harrington May 14, 2024
As organizations implement more security controls on existing applications and devices, attackers are looking for the next target of opportunity. Lax security makes connected vehicles a new vector of potential compromise. Learn more in this preview of a new report.
Blog

Announcing Forrester’s Security & Risk Enterprise Leadership Award

Stephanie Balaouras May 1, 2024
We have opened the call for our annual Security & Risk Enterprise Leadership Award. This award recognizes organizations that have transformed the security, privacy, and risk management functions into capabilities that fuel long-term success. Learn more about the award and how to apply.

Strenthen Security Operations With Agile SecOps

Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.

Webinar

Secure Your Use Of Generative AI

Watch and learn how to use a security framework to secure genAI adoption and explore the security controls and skills crucial for safeguarding this emerging technology.
Blog

Tremors Originating From A California Ripple In The Enterprise Browser Market

Paddy Harrington November 9, 2023
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog

Address IoT Security Before Your Organization Winds Up In The Headlines

Paddy Harrington October 17, 2023
What does car repair have to do with IoT security strategies? Find out.
Blog

Where Should You Start Your Retail IoT Journey?

Michele Pelino October 2, 2023
From data implications to the myriad of use cases, IoT can be somewhat daunting for retail companies. Get some guidance on where to begin with IoT in this post.
Blog

The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?

Jeff Pollard September 28, 2023
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.
Webinar

Enhance Your Security Operations Practice With Agile And Detection Engineering

Get a deep dive on detection engineering in security operations. Hear Forrester advice on best practices and the use of detection–as–code. 
Blog

Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023

David Levine August 22, 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]
Blog

Announcing Forrester’s Security & Risk Enterprise Leadership Award

Stephanie Balaouras June 21, 2023
Forrester is thrilled to announce its inaugural Security & Risk Enterprise Leadership Award, which will recognize security organizations that have transformed the security, privacy, and risk management functions to fuel long-term success. Learn how to apply here.
Blog

Introducing The Forrester Asset Taxonomy

Carlos Casanova March 3, 2023
The definition of “asset” has broadened well beyond traditional financial boundaries in the earliest days of IT asset management. Technology stakeholders are often confused over what constitutes an asset, and the technologies to enable enterprise asset management frequently add to this confusion.
Blog

Get A Head Start On The National Cybersecurity Strategy

Jeff Pollard March 2, 2023
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog

Vehicle Security: Making Sure K.I.T.T. Doesn’t Become K.A.R.R.

Paddy Harrington February 2, 2023
We ended 2022 with the announcement of a vulnerability within SiriusXM Connected Vehicle Services, which has a broad impact because of the ubiquity of these units. In 2023 the vehicle-related software vulnerabilities just keep on coming, this time within API endpoints used by vehicles’ telematics systems, an issue with a wide impact across 16 different […]
Blog

Predictions 2023: Economic Uncertainty And Climate Shifts Will Shape Edge, IoT, And Networking

Michele Pelino November 7, 2022
From the city to the farm, market forces will have a dramatic impact on edge, IoT, and networking. Learn more in our 2023 predictions.
Blog

Predictions 2023: Security Pros Face Greater Internal Risks

Heidi Shey October 31, 2022
On top of the usual challenges, in 2023, security pros will see more risk coming from internal forces, such as enabling anywhere work and the future of the office. Learn more in our 2023 predictions.
Blog

European Predictions 2023: Privacy & Security

Paul McKay October 31, 2022
In 2023, the risk function will rise at European organisations, but one major firm will lose employee trust through misuse of tech. Find out more in our 2023 cybersecurity predictions.
Podcast

Where Did Gaia-X Go Wrong?

What It Means October 13, 2022
The Gaia-X initiative was launched in 2019 as a way for European governments to reclaim data sovereignty from non-European cloud hyperscalers. But it hasn’t lived up to its promise. In this episode, senior analysts Dario Maisto and Jeffrey Rajamani provide an update on the current state and future outlook for Gaia-X.
Webinar

Shape Your 2023 Cybersecurity Priorities For Uncertain Times

As 2023 approaches, security leaders are hard at work planning for the cybersecurity trends headed our way – setting budgets, developing plans, and establishing priorities. Is your plan on track?
Blog

Redefining Data Security For The Modern Age

Heidi Shey August 30, 2022
Learn how to redefine data security in an age of multicloud, anywhere work, edge computing, and changing privacy regulations.
Blog

The Pros And Cons Of Connected Devices

Paddy Harrington July 8, 2022
In May 2022, Business Insider reported that Russian troops stole nearly $5 million worth of farm equipment from a John Deere dealership in Melitopol, Ukraine. The stolen equipment was located by remote GPS and locked, preventing it from being used. This story opens many questions around IoT security and is a path of research that […]
More posts