Gartner Blog Network

Category: 'future' Blog Posts

from the Gartner Blog Network

Security in 2025 - Extrapolate or Bust?

by Anton Chuvakin  |  January 27, 2017

What year is this? Still 2017, indeed. So, imagine it is 2025… and 8 years have passed. How is information security (“cyber security”) different in 2025? But before you start...

Read more »

Deception as a Feature

by Augusto Barros  |  September 30, 2016

One of the things we are also covering as part of our research on deception technologies is the inclusion of deception techniques as features in other security products. There are...

Read more »

New Research: Deception Technologies!

by Augusto Barros  |  September 13, 2016

With the work on our upcoming SOC paper and on the TI paper refresh winding down, we are preparing to start some exciting research in our new project: Deception Technologies!...

Read more »

Are Security Monitoring Alerts Becoming Obsolete?

by Augusto Barros  |  July 8, 2016

If I ask anyone working on a SOC about a high level description of their monitoring process, the answer will most likely look like this: "The SIEM generates an alert,...

Read more »

The Secret to Digital Success? Break the Law, but Don't Get Caught...

by Jack Santos  |  April 18, 2016

We've had some discussions about the future of organizations in a digital world, and then reflected on key success points: Uber, Google/YouTube, others.  One of the lessons learned, as voiced...

Read more »

Sad Hilarity of Predictive Analytics in Security?

by Anton Chuvakin  |  March 31, 2016

After spending a week in Siberia, I am ready for more fun blogging – and of course for more drama that is our industry (GO CYBER DRAMA!). In any case,...

Read more »

Yes, Give Deception a Chance!

by Augusto Barros  |  January 14, 2016

So, Anton finally brought the deception subject up on his blog, leaving a small bait for me at the end of his post. Ok, that's a great subject to return...

Read more »

"Deception as Detection" or Give Deception a Chance?

by Anton Chuvakin  |  January 8, 2016

Many industry observers have noticed that deception approaches are re-emerging in the collective attention of the operational [as opposed to research] security industry and community (“cyber”- community?). We even have...

Read more »

Revenge of the Data Nerds: the Force Awakens

by Jack Santos  |  December 22, 2015

Many years ago, Joe Clapis, (my father-in-law from my first marriage) was an early version of a data nerd, or even a data scientist. He was the Head Statistician for...

Read more »

Is It Really Failing That Bad?

by Augusto Barros  |  December 8, 2015

One of Gartner's 2016 predicts documents includes a very interesting finding about vulnerabilities being exploited:  Existing vulnerabilities remain prevalent throughout the threat landscape, as 99.99% of exploits are based on...

Read more »