Save or Share this Report

For Security & Risk Professionals

Hardcoded For Failure

Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack

June 21, 2017

Primary author headshot

Authors

Why Read This Report

There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very technology enabling today's digital businesses — hardcoded into the hardware and firmware of everything from point-of-sale (POS) devices to consumer electronics to high-end computing systems. In this report, we provide a summary of the more unnoticed but important instances of this threat and detail measures security teams should adopt to keep their firms safe.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).

Purchase

Table of Contents

  • Hardware Compromises Are An Overlooked Cybersecurity Risk
  • To Combat Hardcoded Threats, Follow A Three-Step Strategy
  • Review All Code Security Practices With A Critical Eye
  • Recommendations

  • Realize That Your Organization Is Hardcoded For Trouble
  • Supplemental Material
  • Related Research Documents

Recommended Research