Gartner Blog Network

Category: 'information-security' Blog Posts

from the Gartner Blog Network

Digital GRC: The Dawn of a New Era

by John Wheeler  |  April 29, 2015

On the heels of the publication of our Cool Vendors in Risk Management report, I am now beginning to see the dawn of a new era in governance, risk and...

Read more »

Of mice and data (Policing and Video Information)

by Andrew White  |  April 10, 2015

There was an intriguing article in today's US print edition of the Wall Street journal.  It was titled, "Police Cameras Create Problems of Their Own".  The article explores the burgeoning...

Read more »

Gartner Unveils Digital Risk "Cool Vendors"

by John Wheeler  |  April 7, 2015

Digital business is creating a more complex and wider array of risks for companies today. These risks must be carefully evaluated and clearly articulated to a range of stakeholders including...

Read more »

Save us from the experts.

by Michael Maoz  |  April 2, 2015

There is an oft-used quote from Grace Hopper, or better addressed as Rear Admiral (Amazing) Grace Hopper, USN, Ph.D., that goes, "One accurate measurement is worth more than 1,000 experts."...

Read more »

Seven Ways to IT Risk Management Success

by John Wheeler  |  April 1, 2015

With all the hype and hysteria around the mounting cyber-security threats, companies are seeking to strengthen their management of IT risk. The Wall Street Journal reported last week that some...

Read more »

What Is In Your GRC "Junk Drawer"?

by John Wheeler  |  March 3, 2015

Everyone has one. Somewhere in their kitchen or garage is the infamous "junk drawer". Over time, the drawer fills up with gadgets, tools, scraps of paper with to do lists...

Read more »

Five Tips for Companies Considering Cyber Insurance

by John Wheeler  |  March 2, 2015

As cyber attacks and data breaches are surfacing on a daily basis, our clients are looking for ways to mitigate the risk associated with these events. One of the most...

Read more »

How to Govern Honey Pot Data?

by Andrew White  |  January 5, 2015

I saw a fascinating article in the FT on January 1st, titled “Fake Computers the latest ruse to catch hackers”.  The article explores a new application of an old idea. ...

Read more »

Heat on CIO's and CDO's to increase spend on Information Security Continues to Increase

by Andrew White  |  October 3, 2014

Following my blog the other week (see Information Security Breach: When Does Yours Take Place?) on the ultimate "gap" that needs to be closed to prevent cyber security breaches, there...

Read more »

Information Security Breach - When does Yours Take Place?

by Andrew White  |  September 24, 2014

It seems that security breaches are becoming a daily occurrence. At least in how frequently they are being reported.  In the last few days we heard more regarding Home Depot,...

Read more »