Gartner Blog Network

Category: 'information-security' Blog Posts

from the Gartner Blog Network

Digital Security for the Supply Chain

by Mark Atwood  |  October 19, 2016

A digitally vulnerable Supply Chain can lead to disruption of actual operations.  It can also lead to significant damage to brand and reputation, product safety and integrity issues, loss or...

Read more »

Emerging Risks in Cybersecurity: Gartner's Top Ten Predictions

by John Wheeler  |  August 26, 2016

This week, I presented Gartner's top ten strategic predictions for security at the South Africa Reserve Bank Cybersecurity Conference in Johannesburg, South Africa. In my remarks, I explained that today’s...

Read more »

Collibra "Data Citizens" Customer Conference 2016

by Andrew White  |  May 5, 2016

Collibra Data Citizen NY May 3-4 2016 I had the good fortune to be in the NY area this week and was therefore able to drop by Collibra's first annual...

Read more »

Operational Risk Management Solution Ratings Now Available

by John Wheeler  |  February 20, 2016

The first Critical Capabilities for Operational Risk Management (ORM) Solutions (restricted to Gartner clients only) published this week along with the roll-out of our new Peer Insights for Risk Management Solutions...

Read more »

Join us at the first program designed specifically for Chief Data Officers

by Andrew White  |  January 25, 2016

Where: Gartner Enterprise Information & Master Data Management Summit 2016, Grapevine, Texas (Dallas area) When: March 16 – 18, 2016 Created exclusively* for the most senior data and analytics leaders, this program features brand-new...

Read more »

For 2016, Should We Retire the "Next Generation Firewall"?

by Adam Hils  |  December 29, 2015

Okay, network security industry - I have a question for you: What does NGFW mean today? First, a history lesson: When Gartner initially coined the "next-generation firewall in 2003/2004, it had...

Read more »

Making Sense Out of Chaos: Network Security Policy Management

by Adam Hils  |  December 23, 2015

If you're a network security operations leader (as many of our clients are}, chances are you're afflicted with some of the following security policy-related issues: "I can't tell if my firewall...

Read more »

Network Security Worst Practices (Part 2, Friday the 13th Edition)

by Andrew Lerner  |  November 13, 2015

What better time to talk about worst practices than Friday the 13th? Back in January, we published research (and a blog) on the 12 network security worst practices. These “dirty...

Read more »

Looking Ahead With Gartner's GRC Hype Cycle

by John Wheeler  |  July 16, 2015

Last week, Gartner released its annual Hype Cycle for Governance, Risk & Compliance (GRC) Technologies. In the report, we analyze the trends in the evolving GRC market and what end-users...

Read more »