Gartner Blog Network

Category: 'cybersecurity' Blog Posts

from the Gartner Blog Network

UK: Two Thirds of big business has been breached this year

by Jonathan Care  |  May 8, 2016

The UK Government has sponsored a survey that reveals a significant fraction of businesses have been breached this year. The survey is released with a foreword by Ed Vaizey, the...

Read more »

Testing Your IAM Planning Decisions Needs a Robust Risk Model

by Homan Farahmand  |  April 27, 2016

IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

Read more »

Existing Security Best-Practice Can Handle IoT Exposures?? Not Really

by Earl Perkins  |  April 8, 2016

A recent news article from both a well respected news source and vendor outlined their assurance that IoT security exposures could be taken care of with existing IT-centric security practices...

Read more »

Chasing the Long Tail of Fine-grained Authorization

by Homan Farahmand  |  February 9, 2016

Coarse-grained and fine-grained authorization are similar to classic and quantum physics in many ways. One studies the larger objects and the other deals with subatomic particles. With what scientists know...

Read more »

What's Next After the Internet of Things?

by Earl Perkins  |  February 1, 2016

A belated Happy New Year to everyone! I am not much for writing of the "Top 5" or "Top 10" Big Things that happened in 2015, so you didn't hear...

Read more »

Loss of Safe Harbor creates regulatory fragmentation but EU-US data transfers continue

by Earl Perkins  |  October 6, 2015

I would like to introduce you to my colleague and friend Carsten Casper, who has been following today's announcement from the European Union Commission regarding Safe Harbor. He believed this...

Read more »

Arcane is the new normal in cyber security

by Jonathan Care  |  August 26, 2015

It's the end of Gartner's Security Summit here in Sydney, and it has been great to meet fellow analysts, Gartner clients, and event sponsors. One of the conference themes was...

Read more »

What HAVEN'T We Said About IoT Security So Far?

by Earl Perkins  |  August 10, 2015

If you research Internet of Things (IoT) security daily like many in the analyst industry are doing, you keep reading articles that can be characterized as "admiring the problem". This...

Read more »

Own Your Data and Information by Making Your Own Risk and Security Decisions About Them

by Earl Perkins  |  July 9, 2015

Data security isn't really my area of research and coverage, though I have assisted other colleagues in the past with it. Something that one of the attendees at the Gartner...

Read more »

Getting Cybersecurity to Work isn't Going to Work without Doing the Work

by Earl Perkins  |  January 2, 2015

I thought it would be appropriate to start off 2015 by adding my voice to a rising chorus from advisors, consultants and others in the cybersecurity industry with a short...

Read more »