internet of things (IoT)
Internet of things (IoT) technologies have great promise for brands looking to connect in new and more relevant ways with customers. Read our insights into selecting the right use cases and orchestrating positive experiences using IoT technologies.
Insights
Blog
IoT, IIoT, IoMT, And OT — Welcome To Acronym Mania. What Does It All Mean?
Across IT, acronyms come with the territory. Whether they’re classic ones (ENIAC, Electronic Numerical Integrator and Computer), just a tad more modern (VAX, Virtual Address eXtension), network-based (TCP/IP, Transmission Control Protocol/Internet Protocol; XNS, Xerox Network Systems), or cybersecurity-related (NGAV, next-gen antivirus; DLP, data loss prevention; IDS, intrusion detection system), the acronyms and the process of […]
Webinar
Unveiling The Top 10 Emerging Technologies Of 2025
Get an early look at the top 10 emerging technologies for 2025, hear common use cases for each, and learn how (and when) these advancements will produce real benefits.
Blog
SUSECON 25: Expanding Open Source In Cloud, Edge, And AI
At its recent SUSECON 25 event, SUSE revealed a rebranded portfolio focused on four key platforms. Learn more about those changes and how they could impact your technology plans in this review of the event.
Blog
The Akira IoT Device Attacks Aren’t Just About THAT Device
Securing IoT devices presents unique challenges due to their proprietary operating systems and firmware, which often preclude traditional endpoint protection methods. This blog explores the critical role of network segmentation and Zero Trust principles in mitigating risks, emphasizing the importance of robust edge, network, and gateway security measures to defend against sophisticated attacks such as the Androxgh0st botnet and Akira ransomware.
Blog
Why The DOJ Is Worried About Networking Innovation And What Paths Lie Ahead For HPE And Juniper
The Department of Justice's action to block the Juniper acquisition won't save innovation in networking. No matter whether or not the acquisition proceeds, customers will benefit if they are put front and center.
Blog
DeepSeek Unleashes Smaller-Footprint Models That Can Transform AIOps From Cloud To Edge
Exciting developments such as DeepSeek’s R1 announcement are extending opportunities to run large language models on edge devices. These advancements could have profound implications for edge computing, particularly in the realms of AIOps and observability. By enabling real-time insights and faster automations at the edge, enterprises can enhance their operational posture, drive down costs, and improve operational efficiency and resilience.
Blog
Some Good News In The World Of IoT Security: The FCC Launches The US Cyber Trust Mark Program
The US government is doing something positive around IoT security. With the launch of the US Cyber Trust Mark program, the Federal Communications Commission (FCC) authorized a program and developed rules that bring forward a voluntary labeling standard.
Discover 10 Top Emerging Technologies For 2025
Be among the first to explore the emerging technologies set to transform industries and redefine strategies. Join our live webinar with Forrester VP Brian Hopkins on May 21. Exclusive insights + live Q&A!
Blog
Your Car Is Listening To You — And So Are Hackers
Skoda and Volkswagen are the latest vehicle manufacturers that have had vulnerabilities discovered in their cars that could allow malicious actors to execute code remotely. Find out more about privacy risks in cars and what can be done to minimize them.
Blog
It’s Time To Update Our Smart Manufacturing Tech Tide, And We Need You
Forrester is revising our "Tech Tide: Smart Manufacturing, Q2 2020" for 2025, and we invite your input to the process.
Blog
Building The Future With AI At The Edge: Critical Architecture Decisions For Success
Adopting edge intelligence requires careful architectural decisions that balance latency, data distribution, autonomy needs, security needs, and costs. Learn five essential trade-offs to consider in finding the perfect balance.
Blog
Navigating The Convergence Of Edge Computing, IoT, And OT With AIOps
By providing contextualization within the larger IT estate, AIOps ensures seamless performance, enhanced security, and operational efficiency. Learn more in the final blog in this series.
Blog
Concerned About AI Gathering Business Data? Check Your Phone.
The range of threats targeting mobile devices is extensive, and as AI is integrated into more applications and platforms, security pros will need to implement more controls to reduce risk.
Blog
That’s A Nice IoT Device You’ve Got There … It’d Be A Shame If Mirai Used It For Its Botnet
A variant of the Mirai DDoS botnet that arrived in late 2016 and has remained active (because its creators released the malware for anyone to use) is using unpatched (and, in this case, unpatchable) AVTECH closed-circuit television cameras as part of its botnet to attack targets of opportunity, such as an early target of the […]
Podcast
Digital Doubles Vs. Digital Twins: Unraveling The Distinctions
There are digital doubles and digital twins. How can you tell the two apart? And more importantly, are either (or both) right for your organization? Vice President and Principal Analyst Paul Miller and Senior Analyst Stephanie Liu provide clarity in this episode.
Blog
Even Greener Pastures Have Their Own Manure
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
Blog
Announcing The Forrester Wave™: Mobile Threat Defense Solutions, Q3 2024
Learn three emerging trends in mobile security in this preview of our new Wave report on mobile threat defense systems.
Blog
Securing IoT Devices Demands Applying Zero Trust Principles
Two recent sets of vulnerabilities discovered in medical IoT devices highlight the importance of implementing Zero Trust principles when deploying IoT devices. Learn more in this post.
Podcast
Top 10 Emerging Technologies For 2024
The pace of technology innovation can make it hard to keep an eye on the tech horizon. In this episode, Vice President of Emerging Tech Portfolio Brian Hopkins walks through this year’s list of the top 10 emerging technologies, describing when each technology will bring value to users.
Blog
Forrester’s Top 10 Emerging Technologies For 2024: As AI Dominates, Security Becomes Paramount
Forrester’s list of the top 10 emerging technologies for 2024 reflects the continued dominance of AI but also emphasizes the growing importance of security in our increasingly connected world. Get a deep dive on the top 10 list in this blog post.
Blog
Crashing Through The Walls Of Your Enterprise, Modern Cars Are Leaving Security Gaps
As organizations implement more security controls on existing applications and devices, attackers are looking for the next target of opportunity. Lax security makes connected vehicles a new vector of potential compromise. Learn more in this preview of a new report.
More posts