Articles

  • 3 weeks ago | forrester.com | Paddy Harrington |Michele Pelino |Andrew Hewitt

    Across IT, acronyms come with the territory. Whether they classic ones like ENIAC (electronic numerical integrator and computer) or the just a tad more modern VAX (Virtual Address eXtension), network based TCP/IP (transmission control protocol/internet protocol) or XNS (Xerox Network Systems), or cyber security related like NGAV (next-gen antivirus), DLP (data loss prevention) or IDS (intrusion detection system), the acronyms and the process of keeping up with them is endless.

  • 1 month ago | forrester.com | Janet Farrar Worthington |Andras Cser |Paddy Harrington

    When the average cost of a data breach is $2.7 million and 33% of enterprises report being breached three or more times in the past twelve months, understanding and learning from past incidents is not just beneficial—it’s essential. Our detailed examination of the top 35 breaches and privacy fines of 2024 has unearthed critical insights into the evolving cyber threat landscape.

  • 1 month ago | forrester.com | Andras Cser |Paddy Harrington |Jeff Pollard

    Google has announced definite plans to acquire cloud-native application protection platform (CNAPP) vendor Wiz for $32 billion, which is the largest ever acquisition in cybersecurity, surpassing the $28 billion that Cisco paid for Splunk in 2024. This is also Google’s largest ever acquisition and, based on Forrester’s estimates of Wiz’s annual revenue, represents an astronomically high, approximately 45–50x estimated multiplier of Wiz’s annual revenue.

  • 1 month ago | forrester.com | Paddy Harrington |Jeff Pollard |Merritt Maxim

    Protecting IoT devices is not easy. With few exceptions, you can’t take a traditional endpoint protection approach and install a local agent on the IoT device for protection. Proprietary OS/firmware in many cases precludes installing an endpoint. Even when the device runs embedded Linux or Windows Embedded OS, standard endpoint defensive measures aren’t available either as those are locked OS’s that require complicated processes to update.

  • Jan 16, 2025 | forrester.com | Paddy Harrington

    The US government is doing something positive around IoT Security. With the launch of the U.S. Cyber Trust Mark program, the Federal Communications Commission (FCC) authorized a program and developed rules that bring forward a voluntary labeling standard to inform consumers about the cybersecurity impact of wireless IoT devices they may bring into their homes. Consumer IoT devices are scattered everywhere, from doorbell cameras to smart appliances, baby monitors, and streaming devices.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →