Gartner Blog Network

Category: 'information-security' Blog Posts

from the Gartner Blog Network

Of mice and data (Policing and Video Information)

by Andrew White  |  April 10, 2015

There was an intriguing article in today's US print edition of the Wall Street journal.  It was titled, "Police Cameras Create Problems of Their Own".  The article explores the burgeoning...

Read more »

Gartner Unveils Digital Risk "Cool Vendors"

by John Wheeler  |  April 7, 2015

Digital business is creating a more complex and wider array of risks for companies today. These risks must be carefully evaluated and clearly articulated to a range of stakeholders including...

Read more »

Save us from the experts.

by Michael Maoz  |  April 2, 2015

There is an oft-used quote from Grace Hopper, or better addressed as Rear Admiral (Amazing) Grace Hopper, USN, Ph.D., that goes, "One accurate measurement is worth more than 1,000 experts."...

Read more »

Seven Ways to IT Risk Management Success

by John Wheeler  |  April 1, 2015

With all the hype and hysteria around the mounting cyber-security threats, companies are seeking to strengthen their management of IT risk. The Wall Street Journal reported last week that some...

Read more »

What Is In Your GRC "Junk Drawer"?

by John Wheeler  |  March 3, 2015

Everyone has one. Somewhere in their kitchen or garage is the infamous "junk drawer". Over time, the drawer fills up with gadgets, tools, scraps of paper with to do lists...

Read more »

Five Tips for Companies Considering Cyber Insurance

by John Wheeler  |  March 2, 2015

As cyber attacks and data breaches are surfacing on a daily basis, our clients are looking for ways to mitigate the risk associated with these events. One of the most...

Read more »

Gartner Expands Coverage of GRC Technologies

by John Wheeler  |  January 21, 2015

Gartner's Chief of Research for Risk & Security, Paul Proctor, announced a year ago that Gartner had reset its approach for analyst coverage of Governance, Risk & Compliance (GRC) technologies....

Read more »

How to Govern Honey Pot Data?

by Andrew White  |  January 5, 2015

I saw a fascinating article in the FT on January 1st, titled “Fake Computers the latest ruse to catch hackers”.  The article explores a new application of an old idea. ...

Read more »

Heat on CIO's and CDO's to increase spend on Information Security Continues to Increase

by Andrew White  |  October 3, 2014

Following my blog the other week (see Information Security Breach: When Does Yours Take Place?) on the ultimate "gap" that needs to be closed to prevent cyber security breaches, there...

Read more »