Gartner Blog Network

Category: 'malware' Blog Posts

from the Gartner Blog Network

Excellent Paper: "The Evolving Effectiveness of Endpoint Protection Solutions"

by Anton Chuvakin  |  June 19, 2017

Now, I would have called this paper like so: “What is better, OLD anti-virus or NEW anti-virus?!” The author went for a tamer title version, but it is still an...

Read more »

After WannaCry, what next?

by Jonathan Care  |  June 12, 2017

WannaCry (using the purloined exploit kit ETERNALBLUE) was paused, for now.  Heroic efforts from security practitioners around the world (and a congratulations to @malwaretech for finding the "kill switch" domain!)...

Read more »

3 things to do immediately in the wake of WannaCry

by Jonathan Care  |  May 15, 2017

My colleagues in IT Security have had a busy weekend. Since its discovery on Friday afternoon, the WannaCry ransomware attack has continued to spread this weekend, impacting over 10,000 organizations...

Read more »

Reality Check on EDR / ETDR

by Anton Chuvakin  |  July 23, 2015

How exciting is Endpoint Detection and Response (EDR) technology? -- Sorry to piss on your parade, but for many organizations it is NOT exciting at all. Look, it is hard...

Read more »

New Research on Dealing with Advanced Threats

by Anton Chuvakin  |  February 24, 2014

Yes, there are people [and organizations] out there who need to hear it from Gartner again. And again. And again. And again. THEY NEED TO HEAR IT … FROM GARTNER...

Read more »

Anti-malware Effectiveness Perception Survey Results: Irony Strikes Back

by Anton Chuvakin  |  January 10, 2014

Sometimes the insight is deeply hidden in the lack of insight. Remember my “Survey on Anti-malware Effectiveness Perception”? I asked one question: What percentage of incoming malware do you think...

Read more »

Survey on Anti-malware Effectiveness Perception

by Anton Chuvakin  |  December 19, 2013

This is NOT about how effective today’s anti-virus technology is. This is about how effective people THINK it is! So, go and answer one question: What percentage of incoming malware...

Read more »

Endpoint Threat Detection & Response Deployment Architecture

by Anton Chuvakin  |  August 5, 2013

Now that we have a name [ETDR], let’s talk deployment strategies. On what systems in your organization do you want to deploy the tools that simplify your security incident response...

Read more »

Essential Processes Around Endpoint Threat Detection & Response Tools

by Anton Chuvakin  |  July 31, 2013

Just as network forensics tools (NFT), SIEM and DLP, Endpoint Threat Detection & Response Tools (ETDR) tools are not of the “deploy-and-forget” variety (far from it!). The tools require a...

Read more »