Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

3D Printed Guns Are Coming, One Way or Another. But Should They?

by Pete Basiliere  |  March 5, 2015

Certainly Defense Distributed thinks they should be. Cody Wilson, known for having designed and 3D printed the “Liberator” handgun, wants a MarkForged Mark One printer in order to make an...

Read more »

My Top 7 Popular Gartner Blog Posts for February

by Anton Chuvakin  |  March 4, 2015

Most popular blog posts from my Gartner blog during the past month are: Security Analytics: Projects vs Boxes (Build vs Buy)? (security analytics research) Security Analytics Lessons Learned — and...

Read more »

Killed by AI Much? A Rise of Non-deterministic Security!

by Anton Chuvakin  |  March 3, 2015

Remember [some] NIDS of the 1990s? Specifically, those that were unable to show the packets that matched the rule triggering the alert! Remember how they were deeply hated by the...

Read more »

SIEM/ DLP Add-on Brain?

by Anton Chuvakin  |  February 27, 2015

Initially I wanted to call this post “SIEM has no brains”, but then questioned such harshness towards the technology I’ve been continuously loving for 13 years :-) In any case,...

Read more »

Do you know what software is being delivered with your hardware?

by Victoria Barber  |  February 23, 2015

Organisations with ITAM fully integrated into procurement process should be confident that they have details of all OEM installed components and their licensing. The Superfish incident indicates that this is not...

Read more »

All My Research Published in 2014

by Anton Chuvakin  |  February 23, 2015

To make it easy for my readers to find my recent research, here is the list of everything I published in 2014: Security Information and Event Management (SIEM): Security Information...

Read more »

Those Pesky Users: How To Catch Bad Usage of Good Accounts

by Anton Chuvakin  |  February 19, 2015

Gartner says “Malware Is Already Inside Your Organization; Deal With It.” But you know what? I wish it were just stupid malware (well, some is not so stupid): via a...

Read more »

Security Analytics Lessons Learned -- and Ignored!

by Anton Chuvakin  |  February 9, 2015

As I was finishing the most excellent book “Data-Driven Security: Analysis, Visualization and Dashboards“ (see book site also), one paragraph jumped out and bit me in the face – ouch!...

Read more »

Security Analytics: Projects vs Boxes (Build vs Buy)?

by Anton Chuvakin  |  February 3, 2015

This is going to be a sad one. This is going to include lines like “Even if you only spend $1m on security data scientists per year, you can …”...

Read more »

Digital Business Requires a New Approach to Digital Security

by Peter Sondergaard  |  January 30, 2015

January must be listed somewhere as the official month of “all-day meetings.” This is the time of year when CEOs and their teams hunker down with leaders throughout the business...

Read more »