IoT security
IoT technologies come with ample opportunity . . . and considerable privacy and security risks. Read how your brand can develop IoT security practices that protect your customers and brand.
Insights
Blog
IoT, IIoT, IoMT, And OT — Welcome To Acronym Mania. What Does It All Mean?
In the world of autonomous endpoints, we are dealing with five primary acronyms. To clarify the meaning of these acronyms, here is some guidance and perspective.
Webinar
Unveiling The Top 10 Emerging Technologies Of 2025
Get an early look at the top 10 emerging technologies for 2025, hear common use cases for each, and learn how (and when) these advancements will produce real benefits.
Showcase Your Security & Risk Innovation With A Forrester Award
Get recognized for excellence in security, privacy, and risk innovation. Apply for a Forrester Security & Risk Enterprise Leadership Award to celebrate your success in creating resilient operations. Apply by July 23, 2025.
Blog
The Akira IoT Device Attacks Aren’t Just About THAT Device
Securing IoT devices presents unique challenges due to their proprietary operating systems and firmware, which often preclude traditional endpoint protection methods. This blog explores the critical role of network segmentation and Zero Trust principles in mitigating risks, emphasizing the importance of robust edge, network, and gateway security measures to defend against sophisticated attacks such as the Androxgh0st botnet and Akira ransomware.
Blog
Some Good News In The World Of IoT Security: The FCC Launches The US Cyber Trust Mark Program
The US government is doing something positive around IoT security. With the launch of the US Cyber Trust Mark program, the Federal Communications Commission (FCC) authorized a program and developed rules that bring forward a voluntary labeling standard.
Blog
Your Car Is Listening To You — And So Are Hackers
Skoda and Volkswagen are the latest vehicle manufacturers that have had vulnerabilities discovered in their cars that could allow malicious actors to execute code remotely. Find out more about privacy risks in cars and what can be done to minimize them.
Blog
Warning: The Mobile Endpoint In Your Pocket May Be Just As Vulnerable As Your Desktop
Learn why the Android OS can be just as vulnerable to attacks as Windows and what steps you can take to minimize the risk.
Blog
Predictions 2025: Security And Risk Pros Will Brace For Regulations And Resilience
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
Blog
Apply For The 2024 Forrester Security & Risk Summit Scholarship Today
Forrester is once again partnering with Women in Security and Privacy to provide free admission to our Security & Risk Summit for four women looking to break into cybersecurity. Learn the details and find out how to apply for the scholarship here.
Blog
Why Attack The Front Door If The Mobile Side Door Is Open?
When it comes to mobile device security, barely half of organizations are using unified endpoint management (UEM). That’s like locking the front door and leaving the side door wide open. Find out why security teams overlook mobile devices in this preview of our upcoming Security & Risk Summit.
Blog
That’s A Nice IoT Device You’ve Got There … It’d Be A Shame If Mirai Used It For Its Botnet
A variant of the Mirai DDoS botnet that arrived in late 2016 and has remained active (because its creators released the malware for anyone to use) is using unpatched (and, in this case, unpatchable) AVTECH closed-circuit television cameras as part of its botnet to attack targets of opportunity, such as an early target of the […]
Blog
Don’t Let Another Organization Win Your Forrester 2024 Security & Risk Enterprise Leadership Award
The Security & Risk Enterprise Leadership Award recognizes orgs that transformed the security, privacy, and risk management. Learn more about the award and find out how to apply.
Blog
The Shakedown From Black Hat USA, 2024
What happens when five security analysts gather at a security conference in Las Vegas? Stuff gets broke. Find out more in this review of the recent BlackHat USA event.
Discover 10 Top Emerging Technologies For 2025
Be among the first to explore the emerging technologies set to transform industries and redefine strategies. Join our live webinar with Forrester VP Brian Hopkins on May 21. Exclusive insights + live Q&A!
Blog
A Recent Issue Highlights The Importance Of Securing The Hypervisor
Learn how applying Zero Trust, identity and access management, and endpoint detection and response (EDR) can help protect VMware’s ESXi hypervisor from a newly exploited vulnerability.
Blog
Falcon Fallout: What’s Next For CrowdStrike, Competitors, And CISOs
The July 19 CrowdStrike Falcon outage created major trust issues for the company and the broader security market. What's next for CrowdStrike? Find out as we make several predictions on where the company will go next.
Blog
Invest, Experiment, And Scale Back: Budget Priorities For CISOs In 2025
The majority of security technology decision-makers anticipate further budget increases in 2025. Learn three key areas for CISOs to focus on in the year ahead in this preview of our 2025 Budget Planning Guide for security leaders.
Blog
Even Greener Pastures Have Their Own Manure
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
Blog
Announcing The Forrester Wave™: Mobile Threat Defense Solutions, Q3 2024
Learn three emerging trends in mobile security in this preview of our new Wave report on mobile threat defense systems.
Blog
Securing IoT Devices Demands Applying Zero Trust Principles
Two recent sets of vulnerabilities discovered in medical IoT devices highlight the importance of implementing Zero Trust principles when deploying IoT devices. Learn more in this post.
Podcast
Top 10 Emerging Technologies For 2024
The pace of technology innovation can make it hard to keep an eye on the tech horizon. In this episode, Vice President of Emerging Tech Portfolio Brian Hopkins walks through this year’s list of the top 10 emerging technologies, describing when each technology will bring value to users.
Blog
Forrester’s Top 10 Emerging Technologies For 2024: As AI Dominates, Security Becomes Paramount
Forrester’s list of the top 10 emerging technologies for 2024 reflects the continued dominance of AI but also emphasizes the growing importance of security in our increasingly connected world. Get a deep dive on the top 10 list in this blog post.
More posts