Gartner Blog Network

Category: 'information-security' Blog Posts

from the Gartner Blog Network

Collibra "Data Citizens" Customer Conference 2016

by Andrew White  |  May 5, 2016

Collibra Data Citizen NY May 3-4 2016 I had the good fortune to be in the NY area this week and was therefore able to drop by Collibra's first annual...

Read more »

OpRisk and GRC Solution Ratings Now Available

by John Wheeler  |  February 20, 2016

The first Critical Capabilities for Operational Risk Management (OpRisk) Solutions (restricted to Gartner clients only) published this week along with the roll-out of our new Peer Insights for Governance, Risk &...

Read more »

Join us at the first program designed specifically for Chief Data Officers

by Andrew White  |  January 25, 2016

Where: Gartner Enterprise Information & Master Data Management Summit 2016, Grapevine, Texas (Dallas area) When: March 16 – 18, 2016 Created exclusively* for the most senior data and analytics leaders, this program features brand-new...

Read more »

For 2016, Should We Retire the "Next Generation Firewall"?

by Adam Hils  |  December 29, 2015

Okay, network security industry - I have a question for you: What does NGFW mean today? First, a history lesson: When Gartner initially coined the "next-generation firewall in 2003/2004, it had...

Read more »

Making Sense Out of Chaos: Network Security Policy Management

by Adam Hils  |  December 23, 2015

If you're a network security operations leader (as many of our clients are}, chances are you're afflicted with some of the following security policy-related issues: "I can't tell if my firewall...

Read more »

Network Security Worst Practices (Part 2, Friday the 13th Edition)

by Andrew Lerner  |  November 13, 2015

What better time to talk about worst practices than Friday the 13th? Back in January, we published research (and a blog) on the 12 network security worst practices. These “dirty...

Read more »

Looking Ahead With Gartner's GRC Hype Cycle

by John Wheeler  |  July 16, 2015

Last week, Gartner released its annual Hype Cycle for Governance, Risk & Compliance (GRC) Technologies. In the report, we analyze the trends in the evolving GRC market and what end-users...

Read more »

Security Solutions Can Lead to Risk Problems in the Digital World

by John Wheeler  |  June 17, 2015

This week, a password security company announced that it had been the victim of what they described as a "network compromise" by an unknown intruder. In other words, the company...

Read more »

How Is Cyber Security Like a Hummer?

by John Wheeler  |  May 29, 2015

In my previous blog post, I utilized the analogy of a race car vs. an armored car to demonstrate the need for a "Risk First, Security Second" approach to cyber...

Read more »