Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

SIEM Use Case Implementation and Tuning Process

by Anton Chuvakin  |  November 25, 2015

Time to touch the main challenge: SIEM use case implementation / refinement process [also applicable to other monitoring technologies, like UBA / UEBA]. In our seminal paper on the topic,...

Read more »

Our Vulnerability Assessment Vulnerability Management Research Publishes

by Anton Chuvakin  |  November 24, 2015

It is with much excitement that I announce that our (Augusto’s and mine) batch of three VA/VM papers have published. The documents are linked below (Gartner GTP access required): A...

Read more »

Gartner's Data Center Conference

by Andrew Lerner  |  November 18, 2015

Gartner's US-based Data Center conference is just a few weeks away. This is my favorite Gartner event as there is great content and a number of really smart people at the...

Read more »

Fun Challenges with SIEM Use Cases

by Anton Chuvakin  |  November 11, 2015

Often I save the solutions for our Gartner GTP papers, but I blog about the challenges. No, this won't be a post [eh.... a short trilogy of no more than...

Read more »

SIEM Use Case Discovery

by Anton Chuvakin  |  November 5, 2015

Our journey to SIEM use cases begins at SIEM USE CASE DISCOVERY, a commonly overlooked [even by me :-)] step. Coincidentally, why didn’t I take it seriously sometimes? Because if...

Read more »

SIEM Use Cases - And Other Security Monitoring Use Cases Too!

by Anton Chuvakin  |  October 27, 2015

SIEM and other flexible, broad-use security technologies (but, frankly, SIEM more than others!) raise the critical question of USE CASES. So, together with Augusto Barros, we are about to undertake...

Read more »

2030: Have They Social Engineered Your AI?!

by Anton Chuvakin  |  October 20, 2015

It is with much excitement that I am reporting that our maverick research paper has been published. Please welcome “Maverick* Research: Your Smart Machine Has Been Conned! Now What?” Led...

Read more »

On Stupidity of Some Privacy Themes

by Anton Chuvakin  |  October 16, 2015

Now is a Maverick research season here at Gartner and I wanted to draw your attention to my favorite Maverick research piece that published so far (well, apart from our...

Read more »

Vulnerability Management #1 Problem - After All These Years!

by Anton Chuvakin  |  October 13, 2015

It is 2015 – so how come we don’t know which system vulnerabilities to fix first?! Depending on how one counts, the first vulnerability assessment (VA) tools (aka “vulnerability scanners”)...

Read more »

Loss of Safe Harbor creates regulatory fragmentation but EU-US data transfers continue

by Earl Perkins  |  October 6, 2015

I would like to introduce you to my colleague and friend Carsten Casper, who has been following today's announcement from the European Union Commission regarding Safe Harbor. He believed this...

Read more »