Gartner Blog Network

Category: 'cybersecurity' Blog Posts

from the Gartner Blog Network

Arcane is the new normal in cyber security

by Jonathan Care  |  August 26, 2015

It's the end of Gartner's Security Summit here in Sydney, and it has been great to meet fellow analysts, Gartner clients, and event sponsors. One of the conference themes was...

Read more »

What HAVEN'T We Said About IoT Security So Far?

by Earl Perkins  |  August 10, 2015

If you research Internet of Things (IoT) security daily like many in the analyst industry are doing, you keep reading articles that can be characterized as "admiring the problem". This...

Read more »

Own Your Data and Information by Making Your Own Risk and Security Decisions About Them

by Earl Perkins  |  July 9, 2015

Data security isn't really my area of research and coverage, though I have assisted other colleagues in the past with it. Something that one of the attendees at the Gartner...

Read more »

Getting Cybersecurity to Work isn't Going to Work without Doing the Work

by Earl Perkins  |  January 2, 2015

I thought it would be appropriate to start off 2015 by adding my voice to a rising chorus from advisors, consultants and others in the cybersecurity industry with a short...

Read more »

Operational Technology Security and the Challenges Ahead for 2015

by Earl Perkins  |  December 29, 2014

2014 has been a very active year for cyber attacks and breaches in the industrial automation and control systems areas (what Gartner calls operational technology, or OT). There is no...

Read more »

When are we going to stop admiring the cybersecurity problems facing smart grids and other operational technologies?

by Earl Perkins  |  May 22, 2014

I think after a few years of incessant media coverage on every conceivable way our critical infrastructure can be compromised, many within and outside of operational technology (OT) firms are...

Read more »

The Myth of EMV

by French Caldwell  |  March 25, 2014

...

Read more »