{"id":88008,"date":"2024-06-10T07:00:47","date_gmt":"2024-06-10T14:00:47","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=88008"},"modified":"2024-06-26T18:54:55","modified_gmt":"2024-06-27T01:54:55","slug":"what-are-the-riskiest-connected-devices-right-now","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/","title":{"rendered":"What are the riskiest connected devices right now?"},"content":{"rendered":"<p>By 2028, connected Internet of Things (IoT) devices\u00a0<a href=\"https:\/\/financesonline.com\/number-of-internet-of-things-connected-devices\/\" target=\"new\" rel=\"noopener\">will expand<\/a>\u00a0to over 25 billion. Yet, today\u2019s connected devices are raising the stakes for assessing risk and managing cybersecurity. They have significantly expanded the attack surface creating new challenges and vulnerabilities.<\/p>\n<p>The need for accurate, rapid information from systems across every industry is essential for business operations. From the electric power grid to electrocardiograms, connected devices monitor our health, report changes in conditions or trigger automated actions.<\/p>\n<div style=\"display: block; margin: 10px; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px;\">\n<h4>Riskiest Connected Devices in 2024 \u2013 IT, IoT, OT, IoMT<\/h4>\n<p class=\"u-display-flex u-flex-wrap u-gap\"><a href=\"\/webinars\/2024-riskiest-devices\/\"  title=\"Register For The Webinar\" class=\"c-btn c-btn--primary has-icon icon-camera icon-position-right has-icon-animation icon-animation-pulse\"><span class=\"cta-button-text\">Register For The Webinar<\/span><\/a> <a href=\"\/resources\/2024-riskiest-connected-devices\/\"  title=\"Access The Full Report\" class=\"c-btn c-btn--primary c-btn--outline u-flex-auto u-flex-initial@sm u-justify-center u-justify-start@sm has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\" target=\"new\"><span class=\"cta-button-text\">Access The Full Report<\/span><\/a>\n<\/div>\n<p>Robots on assembly lines. IP cameras monitoring the physical security of nuclear power plants. Wireless access points and routers in offices, cafes and airports. Medical devices in hospitals. They help improve business outcomes and streamline efficiencies. Everything is connected and serves a purpose.<\/p>\n<p>Business purpose, however, does not replace the need for secure and safe experiences. \u00a0In fact, we see a proliferation of special purpose operating systems (OS) \u2013 <strong>in the range of 2,500 across all vertical industries<\/strong>. As valuable as each one of these OSes is to its industry, managing the security of them can be a nightmare.<\/p>\n<p>You do not need to look much further than some of the <a href=\"\/blog\/analysis-a-new-ransomware-group-emerges-from-the-change-healthcare-cyber-attack\/\">latest ransomware attacks in healthcare<\/a> and in <a href=\"\/blog\/analysis-of-energy-sector-cyberattacks-in-denmark-and-ukraine\/\">critical infrastructure<\/a> to understand how connected assets are principal door openings for bad actors.<\/p>\n<p>Our <a href=\"\/resources\/2024-riskiest-connected-devices\/\" target=\"new\" rel=\"noopener\">latest research<\/a> is a deep dive on the riskiest device categories by technology and within industry verticals \u2014 with a global perspective. This is our fourth annual report on asset risk. We have been tracking connected device risk for the last five years in our customer data lake which includes 19 million devices.<\/p>\n<h2>Riskiest connected devices: What has changed in 2024?<\/h2>\n<p>There are certain device and system categories that always land on our annual report. Programmable logic controllers. VoIP equipment. They are here again because these technologies are either inherently insecure or because security configurations are simply ignored.<\/p>\n<p>We have identified the five riskiest device types in four device categories: IT, IoT, OT and IoMT \u2014 for a total of 20 device types. Out of these 20 types, 11 were included in the 2023 report and remain on the list. Nine device types are new: wireless access points, hypervisors, NVRs, robotics \u2014 and every device in the IoMT category.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/06\/Riskiest-Devices-2024-Cateogries.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-88331\" src=\"\/wp-content\/uploads\/2024\/06\/Riskiest-Devices-2024-Cateogries.jpg\" alt=\"\" width=\"1200\" height=\"auto\" \/><\/a><\/p>\n<p>Out of these nine, four were included in the 2022 list and returned while four are completely new: NVR, robotics, medical information systems, electrocardiographs and medication dispensing systems.<\/p>\n<p><strong>Here are some key takeaways for 2024:<\/strong><\/p>\n<ul>\n<li>IoT has become even riskier \u2014 increasing by a whopping 136%<\/li>\n<li>IT-centric devices are the riskiest category<\/li>\n<li>Network devices are now topping endpoints<\/li>\n<li>Within OT, industrial robots are an emerging risky-device area to watch<\/li>\n<li>Our data isolated several risky Internet of Medical Things devices including:\n<ul>\n<li>Medical information systems<\/li>\n<li>Electrocardiographs<\/li>\n<li>DICOM workstations<\/li>\n<li>Picture archiving and communication system (PACS)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>For the complete picture, including a breakdown of riskiest devices by vertical industry and by global region, <a href=\"\/resources\/2024-riskiest-connected-devices\/\" target=\"new\" rel=\"noopener\">access the full report<\/a>.<\/strong><\/p>\n<p>Every organization needs high quality asset intelligence to reduce and manage risk. Because attackers use connected devices as entry points for malicious activity, it is paramount for security teams to understand the risk of everything on the network \u00a0including unmanaged assets.<\/p>\n<p>Our previous research, <a href=\"\/research-labs\/r4iot\/\">R4IoT, examined the next generation of ransomware<\/a>. The need for R4IoT emerged from observing the growth and diversity of IoT, IoMT and OT devices connected to corporate IT networks. These devices expand the attack surface and the risk posture in nearly every business that deals with IT\/OT convergence and the rise of supply chain vulnerabilities. Today, there are <a href=\"https:\/\/id-ransomware.malwarehunterteam.com\/\">over 1,100 ransomware kits<\/a> attackers can use to extort organizations. In 2023, ransomware attacks grew by 73% \u2014 with 4,611 total cases, according to the <a href=\"https:\/\/www.sans.org\/blog\/ransomware-cases-increased-greatly-in-2023\/\" target=\"new\" rel=\"noopener\">SANS Institute<\/a>.<\/p>\n<h2>What\u2019s behind our riskiest connected devices: A risk scoring methodology<\/h2>\n<p>To measure risk, we use a <a href=\"\/resources\/multifactor-risk-scoring\/\">multifactor risk scoring methodology<\/a> which is calculated based on three factors: Configuration, behavior and function.<\/p>\n<ul>\n<li>Configuration is the number and severity of vulnerabilities on a device, plus the quantity and criticality of open ports.<\/li>\n<li>Behavior tracks inbound and outbound malicious traffic to devices and inbound internet traffic towards the devices.<\/li>\n<li>Function is the potential impact to the organization if a device is compromised.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong>Each device is assigned a risk score between one and 10. After measuring the risk of each individual device, we calculate averages per type of device to understand which types are the riskiest.<\/p>\n<p>For <a href=\"\/resources\/2024-riskiest-connected-devices\/\" target=\"new\" rel=\"noopener\">this report<\/a>, we analyzed device data in Forescout\u2019s Device Cloud between January 1 and April 30, 2024. Device Cloud is one of the world\u2019s largest repositories of connected enterprise device data. It\u00a0 includes IT, OT, IoT and IoMT data. The anonymized data is collected from our customer deployments and contains information from nearly 19 million devices \u2013 and grows monthly.<\/p>\n<div style=\"display: block; margin: 10px; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px;\">\n<h4>Riskiest Connected Devices in 2024 \u2013 IT, IoT, OT, IoMT<\/h4>\n<p class=\"u-display-flex u-flex-wrap u-gap\"><a href=\"\/webinars\/2024-riskiest-devices-apj\/\"  title=\"Register For The Webinar\" class=\"c-btn c-btn--primary has-icon icon-camera icon-position-right has-icon-animation icon-animation-pulse\"><span class=\"cta-button-text\">Register For The Webinar<\/span><\/a> <a href=\"\/resources\/2024-riskiest-connected-devices\/\"  title=\"Access The Full Report\" class=\"c-btn c-btn--primary c-btn--outline u-flex-auto u-flex-initial@sm u-justify-center u-justify-start@sm has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\"><span class=\"cta-button-text\">Access The Full Report<\/span><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>By 2028, connected Internet of Things (IoT) devices\u00a0will expand\u00a0to over 25 billion. Yet, today\u2019s connected devices are raising the stakes for assessing risk and managing cybersecurity. They have significantly expanded the attack surface creating new challenges and vulnerabilities. The need for accurate, rapid information from systems across every industry is essential for business operations. From [&hellip;]<\/p>\n","protected":false},"author":124,"featured_media":88261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[540],"tags":[],"coauthors":[542],"class_list":["post-88008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-and-cyber-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are the riskiest connected devices right now? - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the riskiest connected devices right now? - Forescout\" \/>\n<meta property=\"og:description\" content=\"By 2028, connected Internet of Things (IoT) devices\u00a0will expand\u00a0to over 25 billion. Yet, today\u2019s connected devices are raising the stakes for assessing risk and managing cybersecurity. They have significantly expanded the attack surface creating new challenges and vulnerabilities. The need for accurate, rapid information from systems across every industry is essential for business operations. From [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-10T14:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-27T01:54:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/\"},\"author\":{\"name\":\"Forescout Research - Vedere Labs\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\"},\"headline\":\"What are the riskiest connected devices right now?\",\"datePublished\":\"2024-06-10T14:00:47+00:00\",\"dateModified\":\"2024-06-27T01:54:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/\"},\"wordCount\":886,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\",\"articleSection\":[\"Research &amp; Cyber Alerts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/\",\"name\":\"What are the riskiest connected devices right now? - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\",\"datePublished\":\"2024-06-10T14:00:47+00:00\",\"dateModified\":\"2024-06-27T01:54:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg\",\"width\":800,\"height\":419},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the riskiest connected devices right now?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984\",\"name\":\"Forescout Research - Vedere Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g\",\"caption\":\"Forescout Research - Vedere Labs\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the riskiest connected devices right now? - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/","og_locale":"en_US","og_type":"article","og_title":"What are the riskiest connected devices right now? - Forescout","og_description":"By 2028, connected Internet of Things (IoT) devices\u00a0will expand\u00a0to over 25 billion. Yet, today\u2019s connected devices are raising the stakes for assessing risk and managing cybersecurity. They have significantly expanded the attack surface creating new challenges and vulnerabilities. The need for accurate, rapid information from systems across every industry is essential for business operations. From [&hellip;]","og_url":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2024-06-10T14:00:47+00:00","article_modified_time":"2024-06-27T01:54:55+00:00","og_image":[{"width":800,"height":419,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","type":"image\/jpeg"}],"author":"Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/"},"author":{"name":"Forescout Research - Vedere Labs","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984"},"headline":"What are the riskiest connected devices right now?","datePublished":"2024-06-10T14:00:47+00:00","dateModified":"2024-06-27T01:54:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/"},"wordCount":886,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","articleSection":["Research &amp; Cyber Alerts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/","url":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/","name":"What are the riskiest connected devices right now? - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","datePublished":"2024-06-10T14:00:47+00:00","dateModified":"2024-06-27T01:54:55+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","width":800,"height":419},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/what-are-the-riskiest-connected-devices-right-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"What are the riskiest connected devices right now?"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/038ef2eda17d37f87d9978fa703ee984","name":"Forescout Research - Vedere Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/b4c8db5600adef8fa1a89cc86e15c781","url":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f43608a91eb86cde1564e21650235d0ed570d1ae0fbd371a265636ed603e70d?s=96&d=mm&r=g","caption":"Forescout Research - Vedere Labs"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-Riskiest-Connected-Devices-Report-Share-v2.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/88008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/124"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=88008"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/88008\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/88261"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=88008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=88008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=88008"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=88008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}