Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Bringing Clarity to "Fluffy Management Stuff" With IRM

by John Wheeler  |  March 29, 2017

I had the honor and privilege to spend several days last week with 400 IT leaders at our Gartner Peer Forum in Orlando, Florida. Speaking to the group gave me...

Read more »

Microsegmentation

by Andrew Lerner  |  March 21, 2017

Microsegmentation is a hot topic, and is one of the top-three inquiry subjects for Gartner clients regarding cloud security. I’m not a security analyst, but microsegmentation comes up quite a...

Read more »

IRM Solutions Market Will Grow to $7.3 Billion by 2020

by John Wheeler  |  March 20, 2017

Earlier this month, Gartner released its inaugural forecast of the integrated risk management (IRM) software solutions market. The IRM market — formerly referred to as "governance, risk management and compliance...

Read more »

Threat Intelligence Interest areas of Gartner clients

by Lawrence Pingree  |  March 10, 2017

Been a while since I've blogged, so I figured I'd update you on what I'm digging into in Q217 with Ruggero Contu (my awesome teammate). He and I are collaborating...

Read more »

Welcoming Security and Risk to the Digital Ecosystem

by Sam Olyaei  |  March 9, 2017

Gartner's 2017 CIO Agenda shows more and more enterprises joining digital ecosystems as digitization initiatives mature. Top performing organizations especially, separate themselves from the rest of the pack by emphasizing leadership,...

Read more »

NY DFS Cybersecurity Regulation goes into effect today, and it is already outdated!

by Sam Olyaei  |  March 1, 2017

After an initial delay, the New York State Department of Financial Services (NY DFS) finalized its new cybersecurity regulation that goes into effect March 1st (today). The new rules require...

Read more »

2016 Healthcare Security - The Breach Goes on

by Jack Santos  |  February 9, 2017

This is my 7th year of analyzing healthcare breaches reported to HHS.  This has become a tradition, and I don't profess it to be an exacting science - some rather...

Read more »

The Subtleties of Data Sovereignty

by Andrew White  |  February 7, 2017

The ongoing complexities and issues related to data privacy and security that spans jurisdictions around the globe were explored in a Comment piece in today's US print edition of the...

Read more »

My Top 7 Popular Gartner Blog Posts for January 2017

by Anton Chuvakin  |  February 2, 2017

Most popular blog posts from my Gartner blog during the past month are: Our “Comparison of Endpoint Detection and Response Technologies and Solutions” Paper Publishes (EDR research) Why SIEMs F*cked...

Read more »

Ok, So Who Really MUST Get a UEBA?

by Anton Chuvakin  |  January 24, 2017

As I mentioned in my 2014 post on security analytics and in a related GTP paper at the same time, “The noise about big data for security has grown deafening...

Read more »