Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Deception related technology - its not just a "nice to have", its a new strategy of defense

by Lawrence Pingree  |  September 28, 2016

Deception Techniques "Can", and "Are" be used in other Security Solutions In my earlier Emerging Technology note on deception (see "Emerging Technology Analysis: Deception Techniques and Technologies Create Security Technology...

Read more »

Tricky: Building a Business Case for A Deception Tool?

by Anton Chuvakin  |  September 23, 2016

How do you develop a business case for a DECEPTION TOOL?! I just went through a whole bunch of deception vendor materials and I was unpleasantly surprised at the lack...

Read more »

It Is Happening: We Are Starting Our Deception Research!

by Anton Chuvakin  |  September 16, 2016

As my illustrious colleague mentioned, we are starting a new research project, one we wanted to run for a while, about DECEPTION. While there is already Gartner research on the...

Read more »

My Top 7 Popular Gartner Blog Posts for August 2016

by Anton Chuvakin  |  September 5, 2016

Most popular blog posts from my Gartner blog during the past month are: Our “Comparison of Endpoint Detection and Response Technologies and Solutions” Paper Publishes (EDR research) SIEM Use Cases...

Read more »

Emerging Risks in Cybersecurity: Gartner's Top Ten Predictions

by John Wheeler  |  August 26, 2016

This week, I presented Gartner's top ten strategic predictions for security at the South Africa Reserve Bank Cybersecurity Conference in Johannesburg, South Africa. In my remarks, I explained that today’s...

Read more »

How to Grow to Strategic Threat Intel Consumption?

by Anton Chuvakin  |  August 24, 2016

Here is a bitchingly hard question: how to get organizations to move up the maturity scale of using threat intelligence (TI), from blindly [ok, not always blindly] dropping indicator feeds...

Read more »

Speaking at Gartner Security and Risk Management Summit London 2016

by Anton Chuvakin  |  August 23, 2016

Gartner Security Summit London 2016 is coming soon – and this time I will be there! Here is my traditional blog post summarizing my speaking at this event (London, UK...

Read more »

Threats Inside vs Insider Threat

by Anton Chuvakin  |  August 9, 2016

Here is a quick one on INSIDER THREAT. Deep down, we all know that nobody cares about the insider threat. Well, not literally “nobody”; few organizations do care about their...

Read more »

My Latest Research: Competitive Landscape: Distributed Deception Platforms, 2016

by Lawrence Pingree  |  August 4, 2016

4 August 2016  |  Distributed deception platforms are now a viable option for enhancing detection within enterprise security programs. Product marketing managers must understand the competitive positioning of their products...

Read more »

Imagine the next Security News Headlines....

by Lawrence Pingree  |  July 27, 2016

Just for a moment, imagine the following scenario: "RandomCompany implements distributed deception platform technology, deploys fake databases and data throughout their environment." News story breaks that "underground news sites report...

Read more »