Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Imagine the next Security News Headlines....

by Lawrence Pingree  |  July 27, 2016

Just for a moment, imagine the following scenario: "RandomCompany implements distributed deception platform technology, deploys fake databases and data throughout their environment." News story breaks that "underground news sites report...

Read more »

Can I Detect Advanced Threats With Just Flows/IPFIX?

by Anton Chuvakin  |  July 21, 2016

Source IP. Destination IP. Source port. Destination port. Network protocol. Connection time. A bit more context data. Is this enough to detect “an advanced threat”? Before you jump to conclusions,...

Read more »

Speaking at Gartner Catalyst 2016

by Anton Chuvakin  |  July 15, 2016

Gartner Catalyst 2016, a conference by Gartner for Techical Professionals (GTP), is coming soon. Here is my traditional blog post summarizing my speaking at this event (San Diego, CA –...

Read more »

What's New on Gartner's Hype Cycle for Risk Management Solutions, 2016

by John Wheeler  |  July 13, 2016

I'm pleased to announce the publication of Gartner's very first Hype Cycle for Risk Management Solutions and it marks a significant evolution in our research agenda. Formerly known as the Hype...

Read more »

Webinar QA 2: Manage Risk & Security in the IoT

by Earl Perkins  |  July 8, 2016

As I stated in a recent blog, I completed a Gartner webinar that is now recorded-- you can find this recording at http://www.gartner.com/webinar/3337817 if you are interested. At the end...

Read more »

About The Tri-Team Model of SOC, CIRT, "Threat Something"

by Anton Chuvakin  |  July 7, 2016

From the clients with THE MOST mature security operations, we learn the so-called “tri-team” model for detection and response: SOC – primarily monitoring and threat detection in near real-time, and...

Read more »

Are Gartner client's interested in threat deception?

by Lawrence Pingree  |  July 6, 2016

From time to time, I get client inquiries that ask, "Is someone interested in this technology?".  I have recently covered deception techniques and technologies, and because of that I've received quite...

Read more »

Webinar- Manage Risk & Security in the IoT

by Earl Perkins  |  July 6, 2016

On July 5, 2016 I gave a Gartner webinar entitled "Practical Steps to Manage Risk and Security in the Internet of Things" (This webinar can be viewed and listened to...

Read more »

Brexit - Advice For CIOs, Chief Supply Chain Officers and Marketing Leaders.

by Peter Sondergaard  |  July 1, 2016

It’s been a week since the U.K. voted in a referendum to leave the European Union (EU) and there’s an unprecedented amount of fear, uncertainty and doubt about the economic...

Read more »

Is deception effective at delaying or detecting an attacker?

by Lawrence Pingree  |  June 30, 2016

The first question that many folks ask about using deceptions in their security programs is, can't a deception be easily detected? The answer is yes but also no. IN fact, this...

Read more »