Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Emerging Risks in Cybersecurity: Gartner's Top Ten Predictions

by John Wheeler  |  August 26, 2016

This week, I presented Gartner's top ten strategic predictions for security at the South Africa Reserve Bank Cybersecurity Conference in Johannesburg, South Africa. In my remarks, I explained that today’s...

Read more »

How to Grow to Strategic Threat Intel Consumption?

by Anton Chuvakin  |  August 24, 2016

Here is a bitchingly hard question: how to get organizations to move up the maturity scale of using threat intelligence (TI), from blindly [ok, not always blindly] dropping indicator feeds...

Read more »

Speaking at Gartner Security and Risk Management Summit London 2016

by Anton Chuvakin  |  August 23, 2016

Gartner Security Summit London 2016 is coming soon – and this time I will be there! Here is my traditional blog post summarizing my speaking at this event (London, UK...

Read more »

Threats Inside vs Insider Threat

by Anton Chuvakin  |  August 9, 2016

Here is a quick one on INSIDER THREAT. Deep down, we all know that nobody cares about the insider threat. Well, not literally “nobody”; few organizations do care about their...

Read more »

My Latest Research: Competitive Landscape: Distributed Deception Platforms, 2016

by Lawrence Pingree  |  August 4, 2016

4 August 2016  |  Distributed deception platforms are now a viable option for enhancing detection within enterprise security programs. Product marketing managers must understand the competitive positioning of their products...

Read more »

Imagine the next Security News Headlines....

by Lawrence Pingree  |  July 27, 2016

Just for a moment, imagine the following scenario: "RandomCompany implements distributed deception platform technology, deploys fake databases and data throughout their environment." News story breaks that "underground news sites report...

Read more »

Can I Detect Advanced Threats With Just Flows/IPFIX?

by Anton Chuvakin  |  July 21, 2016

Source IP. Destination IP. Source port. Destination port. Network protocol. Connection time. A bit more context data. Is this enough to detect “an advanced threat”? Before you jump to conclusions,...

Read more »

Speaking at Gartner Catalyst 2016

by Anton Chuvakin  |  July 15, 2016

Gartner Catalyst 2016, a conference by Gartner for Techical Professionals (GTP), is coming soon. Here is my traditional blog post summarizing my speaking at this event (San Diego, CA –...

Read more »

What's New on Gartner's Hype Cycle for Risk Management Solutions, 2016

by John Wheeler  |  July 13, 2016

I'm pleased to announce the publication of Gartner's very first Hype Cycle for Risk Management Solutions and it marks a significant evolution in our research agenda. Formerly known as the Hype...

Read more »

Webinar QA 2: Manage Risk & Security in the IoT

by Earl Perkins  |  July 8, 2016

As I stated in a recent blog, I completed a Gartner webinar that is now recorded-- you can find this recording at http://www.gartner.com/webinar/3337817 if you are interested. At the end...

Read more »