Gartner Blog Network

Category: 'cybersecurity' Blog Posts

from the Gartner Blog Network

Webinar QA 2: Manage Risk & Security in the IoT

by Earl Perkins  |  July 8, 2016

As I stated in a recent blog, I completed a Gartner webinar that is now recorded-- you can find this recording at http://www.gartner.com/webinar/3337817 if you are interested. At the end...

Read more »

Webinar- Manage Risk & Security in the IoT

by Earl Perkins  |  July 6, 2016

On July 5, 2016 I gave a Gartner webinar entitled "Practical Steps to Manage Risk and Security in the Internet of Things" (This webinar can be viewed and listened to...

Read more »

UK: Two Thirds of big business has been breached this year

by Jonathan Care  |  May 8, 2016

The UK Government has sponsored a survey that reveals a significant fraction of businesses have been breached this year. The survey is released with a foreword by Ed Vaizey, the...

Read more »

Testing Your IAM Planning Decisions Needs a Robust Risk Model

by Homan Farahmand  |  April 27, 2016

IAM planners/architects can greatly benefit from predicting the impact of a prioritization decision on operational risk, before making the actual decision. Why? Because testing an IAM planning decision in a...

Read more »

Existing Security Best-Practice Can Handle IoT Exposures?? Not Really

by Earl Perkins  |  April 8, 2016

A recent news article from both a well respected news source and vendor outlined their assurance that IoT security exposures could be taken care of with existing IT-centric security practices...

Read more »

Chasing the Long Tail of Fine-grained Authorization

by Homan Farahmand  |  February 9, 2016

Coarse-grained and fine-grained authorization are similar to classic and quantum physics in many ways. One studies the larger objects and the other deals with subatomic particles. With what scientists know...

Read more »

What's Next After the Internet of Things?

by Earl Perkins  |  February 1, 2016

A belated Happy New Year to everyone! I am not much for writing of the "Top 5" or "Top 10" Big Things that happened in 2015, so you didn't hear...

Read more »

Loss of Safe Harbor creates regulatory fragmentation but EU-US data transfers continue

by Earl Perkins  |  October 6, 2015

I would like to introduce you to my colleague and friend Carsten Casper, who has been following today's announcement from the European Union Commission regarding Safe Harbor. He believed this...

Read more »

Arcane is the new normal in cyber security

by Jonathan Care  |  August 26, 2015

It's the end of Gartner's Security Summit here in Sydney, and it has been great to meet fellow analysts, Gartner clients, and event sponsors. One of the conference themes was...

Read more »

What HAVEN'T We Said About IoT Security So Far?

by Earl Perkins  |  August 10, 2015

If you research Internet of Things (IoT) security daily like many in the analyst industry are doing, you keep reading articles that can be characterized as "admiring the problem". This...

Read more »