IoT security

IoT technologies come with ample opportunity . . . and considerable privacy and security risks. Read how your brand can develop IoT security practices that protect your customers and brand.

Discover how Forrester supports IT leaders.

Insights

Blog

Predictions 2025: Security And Risk Pros Will Brace For Regulations And Resilience

Cody Scott October 1, 2024
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
Blog

Apply For The 2024 Forrester Security & Risk Summit Scholarship Today

Allie Mellen September 30, 2024
Forrester is once again partnering with Women in Security and Privacy to provide free admission to our Security & Risk Summit for four women looking to break into cybersecurity. Learn the details and find out how to apply for the scholarship here.
Blog

Why Attack The Front Door If The Mobile Side Door Is Open?

Paddy Harrington September 19, 2024
When it comes to mobile device security, barely half of organizations are using unified endpoint management (UEM). That’s like locking the front door and leaving the side door wide open. Find out why security teams overlook mobile devices in this preview of our upcoming Security & Risk Summit.
Blog

That’s A Nice IoT Device You’ve Got There … It’d Be A Shame If Mirai Used It For Its Botnet

Paddy Harrington September 16, 2024
A variant of the Mirai DDoS botnet that arrived in late 2016 and has remained active (because its creators released the malware for anyone to use) is using unpatched (and, in this case, unpatchable) AVTECH closed-circuit television cameras as part of its botnet to attack targets of opportunity, such as an early target of the […]
Blog

Don’t Let Another Organization Win Your Forrester 2024 Security & Risk Enterprise Leadership Award

Amy DeMartine September 16, 2024
The Security & Risk Enterprise Leadership Award recognizes orgs that transformed the security, privacy, and risk management. Learn more about the award and find out how to apply.
Blog

The Shakedown From Black Hat USA, 2024

Sandy Carielli August 14, 2024
What happens when five security analysts gather at a security conference in Las Vegas? Stuff gets broke. Find out more in this review of the recent BlackHat USA event.
Blog

A Recent Issue Highlights The Importance Of Securing The Hypervisor

Paddy Harrington August 8, 2024
Learn how applying Zero Trust, identity and access management, and endpoint detection and response (EDR) can help protect VMware’s ESXi hypervisor from a newly exploited vulnerability.

Jan. 30 Tech & Security Predictions Webinar

Join us to dive into the top 2025 predictions and discover their impact on your tech and security strategies — with exclusive insights from the analysts who conducted the research.

Blog

Falcon Fallout: What’s Next For CrowdStrike, Competitors, And CISOs

Jeff Pollard August 6, 2024
The July 19 CrowdStrike Falcon outage created major trust issues for the company and the broader security market. What's next for CrowdStrike? Find out as we make several predictions on where the company will go next.
Blog

Invest, Experiment, And Scale Back: Budget Priorities For CISOs In 2025

Jeff Pollard August 1, 2024
The majority of security technology decision-makers anticipate further budget increases in 2025. Learn three key areas for CISOs to focus on in the year ahead in this preview of our 2025 Budget Planning Guide for security leaders.
Blog

Even Greener Pastures Have Their Own Manure

Paddy Harrington July 31, 2024
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
Blog

Announcing The Forrester Wave™: Mobile Threat Defense Solutions, Q3 2024

Paddy Harrington July 18, 2024
Learn three emerging trends in mobile security in this preview of our new Wave report on mobile threat defense systems.
Blog

Securing IoT Devices Demands Applying Zero Trust Principles

Paddy Harrington July 15, 2024
Two recent sets of vulnerabilities discovered in medical IoT devices highlight the importance of implementing Zero Trust principles when deploying IoT devices. Learn more in this post.

Ready For These 2025 Tech And Security Shifts?

Step into 2025 with confidence! Explore our predictions for tech and security leaders, featuring key trends in AI, cloud, SDLC, and AIOps you need to know.

Podcast

Top 10 Emerging Technologies For 2024

What It Means June 27, 2024
The pace of technology innovation can make it hard to keep an eye on the tech horizon. In this episode, Vice President of Emerging Tech Portfolio Brian Hopkins walks through this year’s list of the top 10 emerging technologies, describing when each technology will bring value to users.
Blog

Forrester’s Top 10 Emerging Technologies For 2024: As AI Dominates, Security Becomes Paramount

Brian Hopkins June 25, 2024
Forrester’s list of the top 10 emerging technologies for 2024 reflects the continued dominance of AI but also emphasizes the growing importance of security in our increasingly connected world. Get a deep dive on the top 10 list in this blog post.
Blog

Crashing Through The Walls Of Your Enterprise, Modern Cars Are Leaving Security Gaps

Paddy Harrington May 14, 2024
As organizations implement more security controls on existing applications and devices, attackers are looking for the next target of opportunity. Lax security makes connected vehicles a new vector of potential compromise. Learn more in this preview of a new report.
Blog

Announcing Forrester’s Security & Risk Enterprise Leadership Award

Stephanie Balaouras May 1, 2024
We have opened the call for our annual Security & Risk Enterprise Leadership Award. This award recognizes organizations that have transformed the security, privacy, and risk management functions into capabilities that fuel long-term success. Learn more about the award and how to apply.
Webinar

Secure Your Use Of Generative AI

Watch and learn how to use a security framework to secure genAI adoption and explore the security controls and skills crucial for safeguarding this emerging technology.

Unleash Your Security Genius In Just 3 Days

Join us in Baltimore December 9–11 for our Security & Risk Summit, featuring 30-plus sessions, workshops, keynotes, case studies, and specialized tracks for targeted learning.

Blog

Tremors Originating From A California Ripple In The Enterprise Browser Market

Paddy Harrington November 9, 2023
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog

Address IoT Security Before Your Organization Winds Up In The Headlines

Paddy Harrington October 17, 2023
What does car repair have to do with IoT security strategies? Find out.
Blog

Where Should You Start Your Retail IoT Journey?

Michele Pelino October 2, 2023
From data implications to the myriad of use cases, IoT can be somewhat daunting for retail companies. Get some guidance on where to begin with IoT in this post.
More posts