IoT security
IoT technologies come with ample opportunity . . . and considerable privacy and security risks. Read how your brand can develop IoT security practices that protect your customers and brand.
Insights
Blog
Introducing The Forrester Asset Taxonomy
The definition of “asset” has broadened well beyond traditional financial boundaries in the earliest days of IT asset management. Technology stakeholders are often confused over what constitutes an asset, and the technologies to enable enterprise asset management frequently add to this confusion.
Blog
Get A Head Start On The National Cybersecurity Strategy
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog
Vehicle Security: Making Sure K.I.T.T. Doesn’t Become K.A.R.R.
We ended 2022 with the announcement of a vulnerability within SiriusXM Connected Vehicle Services, which has a broad impact because of the ubiquity of these units. In 2023 the vehicle-related software vulnerabilities just keep on coming, this time within API endpoints used by vehicles’ telematics systems, an issue with a wide impact across 16 different […]
Blog
Predictions 2023: Economic Uncertainty And Climate Shifts Will Shape Edge, IoT, And Networking
From the city to the farm, market forces will have a dramatic impact on edge, IoT, and networking. Learn more in our 2023 predictions.
Blog
Predictions 2023: Security Pros Face Greater Internal Risks
On top of the usual challenges, in 2023, security pros will see more risk coming from internal forces, such as enabling anywhere work and the future of the office. Learn more in our 2023 predictions.
Blog
European Predictions 2023: Privacy & Security
In 2023, the risk function will rise at European organisations, but one major firm will lose employee trust through misuse of tech. Find out more in our 2023 cybersecurity predictions.
Podcast
Where Did Gaia-X Go Wrong?
The Gaia-X initiative was launched in 2019 as a way for European governments to reclaim data sovereignty from non-European cloud hyperscalers. But it hasn’t lived up to its promise. In this episode, senior analysts Dario Maisto and Jeffrey Rajamani provide an update on the current state and future outlook for Gaia-X.
Webinar
Shape Your 2023 Cybersecurity Priorities For Uncertain Times
As 2023 approaches, security leaders are hard at work planning for the cybersecurity trends headed our way – setting budgets, developing plans, and establishing priorities. Is your plan on track?
Blog
Redefining Data Security For The Modern Age
Learn how to redefine data security in an age of multicloud, anywhere work, edge computing, and changing privacy regulations.
Blog
The Pros And Cons Of Connected Devices
In May 2022, Business Insider reported that Russian troops stole nearly $5 million worth of farm equipment from a John Deere dealership in Melitopol, Ukraine. The stolen equipment was located by remote GPS and locked, preventing it from being used. This story opens many questions around IoT security and is a path of research that […]
Blog
Insteon And The Internet Of Bricks
Last month, smart home provider Insteon appears to have shut down, rendering the Insteon hubs inoperable. Users were unable to control their IoT devices connected to the Insteon hub, such as smart lighting and appliances. The culprit appears to not be malicious malware but rather financial circumstances that have caused the company to cease operations. […]
Blog
Our 2022 Top Recommendations For Your Security Program: CISOs Get An Offer They Can’t Refuse
The Coppola classic has a few surprising parallels with today's chief information security officer.
Blog
Meet The New Endpoint Security And IoT Security Analyst: Paddy Harrington
Tell us about yourself! I’ve spent the last 25-plus years in the end user computing space — the world of connecting end users to their applications and data. My teenage hobby of computers has turned into my career, with my initial education in aeronautics. Whether it was seeing “WarGames” when it first came out, “hacking” […]
Blog
The Next Decade Of Healthcare Is Primed For Seismic Disruption By Hospital-At-Home
The house call has made a comeback, accelerated by the pandemic. This is the leading edge of a monumental shift in healthcare.
Blog
There’s A Growing Blind Spot For Your Security Team During The Pandemic — IoT Devices
Businesses may not be able to dictate what devices employees keep on their home networks, there are still many options available to IT departments to protect company assets.
Blog
Microsoft Purchases CyberX
Today, Microsoft announced that it has acquired Waltham, Massachusetts-based internet-of-things (IoT) and industrial control system (ICS) security vendor CyberX. While the purchase price was not disclosed, media reports are speculating that the purchase price was somewhere between $150–$165 million. Founded in 2013, CyberX has raised $48 million in venture capital, so this deal provides a good return to investors. CyberX’s core solution can monitor IoT and ICS environments […]
Blog
Introducing The Forrester New Wave™: Connected Medical Device Security, Q2 2020
We are thrilled to announce that “The Forrester New Wave™: Connected Medical Device Security, Q2 2020” is now live. This report will help you understand how the top eight vendors in the emerging medical device security space stack up against 10 different criteria. We looked at product functionality and vendor strategy through live demos and […]
Blog
Future Of Retail 2020: Retailers Test Consumer-Facing And Operational IoT Solutions
To understand how Forrester’s predictions will unfold in the retail industry in 2020, my colleague Madeline Cyr and I interviewed experts within Forrester for our “Applying 2020 Predictions To Retail” series. To understand the internet of things (IoT) predictions for 2020, we spoke with Forrester IoT expert Frank Gillett. Madeline Cyr: In 2020, you predict […]
Blog
Navigating The European 5G Security Debate
At present, it is difficult to remember life before the COVID-19 pandemic, but a key switch that has happened is the large-scale shifting of the population to work at home, as widely documented. Some mobile operators in the UK recently have had a bit of a bumpy ride, with spotty coverage and outages experienced as […]
Blog
A CISO’s Guide To Leading Change
5 ways security chiefs can use internal politics to their advantage.
More posts