Gartner Blog Network

Category: 'cybersecurity' Blog Posts

from the Gartner Blog Network

The Latest U.S. DDoS Attack: Sorry, But I Don't Feel Sorry For Us

by Earl Perkins  |  October 24, 2016

The recent distributed denial-of-service attacks on various U.S. and world networks leveraging compromised Internet of Things (IoT) devices have long been predicted, discussed and now analyzed over the past few...

Read more »

The New Digital Security Organization

by Earl Perkins  |  October 17, 2016

Information Technology isn't what it used to be, is it? At one point we were focused on a relatively fixed set of infrastructure and software- mainframe computers, mid-range computers, servers,...

Read more »

It's Time to Move on From "What is the Internet of Things" Discussion If You Want to Secure It

by Earl Perkins  |  October 12, 2016

Among Gartner clients we are now beginning to see IoT "definition fatigue" set in as the glitz and excitement surrounding the concept settles into the hard business light of day....

Read more »

Threat Fatigue and the Failure of Cybersecurity

by Earl Perkins  |  October 7, 2016

There was a recent U.S. National Institute of Standards and Technology (NIST) study titled "Security Fatigue" that was released regarding people's experiences with online security. Though it had what we...

Read more »

Webinar QA 2: Manage Risk & Security in the IoT

by Earl Perkins  |  July 8, 2016

As I stated in a recent blog, I completed a Gartner webinar that is now recorded-- you can find this recording at if you are interested. At the end...

Read more »

Webinar- Manage Risk & Security in the IoT

by Earl Perkins  |  July 6, 2016

On July 5, 2016 I gave a Gartner webinar entitled "Practical Steps to Manage Risk and Security in the Internet of Things" (This webinar can be viewed and listened to...

Read more »

UK: Two Thirds of big business has been breached this year

by Jonathan Care  |  May 8, 2016

The UK Government has sponsored a survey that reveals a significant fraction of businesses have been breached this year. The survey is released with a foreword by Ed Vaizey, the...

Read more »

Testing Your IAM Planning Decisions Needs a Robust Risk Model

by Homan Farahmand  |  April 27, 2016

IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

Read more »

Existing Security Best-Practice Can Handle IoT Exposures?? Not Really

by Earl Perkins  |  April 8, 2016

A recent news article from both a well respected news source and vendor outlined their assurance that IoT security exposures could be taken care of with existing IT-centric security practices...

Read more »

Chasing the Long Tail of Fine-grained Authorization

by Homan Farahmand  |  February 9, 2016

Coarse-grained and fine-grained authorization are similar to classic and quantum physics in many ways. One studies the larger objects and the other deals with subatomic particles. With what scientists know...

Read more »