Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Next Research: Back to Security Analytics and UBA/UEBA

by Anton Chuvakin  |  October 27, 2016

Our deception research is winding down and the paper is nearly ready, so we are thinking about what’s next. In fact, we are going to cook something really exciting: a...

Read more »

Symposium Notes – Day Four Returns to Data Security, and to Hadoop

by Merv Adrian  |  October 26, 2016

Thursday, the final day, reinforced a theme for the week: data security is heating up, and organizations are not ready. It came up in half of today’s final 10 meetings....

Read more »

Our “How to Plan, Design, Operate and Evolve a SOC” Paper Is Published

by Anton Chuvakin  |  October 25, 2016

As Augusto already mentioned, our SOC paper is out. Run, not walk, to read our “How to Plan, Design, Operate and Evolve a SOC” (Gartner GTP access required). The abstract...

Read more »

Symposium Notes - Day Three Features Data Assembly

by Merv Adrian  |  October 24, 2016

With 24 meetings under my belt from the first two days at Orlando Symposium, Wednesday’s 13 (and a presentation) didn’t look quite as daunting. It began well, with enough time...

Read more »

The Latest U.S. DDoS Attack: Sorry, But I Don't Feel Sorry For Us

by Earl Perkins  |  October 24, 2016

The recent distributed denial-of-service attacks on various U.S. and world networks leveraging compromised Internet of Things (IoT) devices have long been predicted, discussed and now analyzed over the past few...

Read more »

APT-Ready? Better Threat Detection vs Detecting “Better” Threats?

by Anton Chuvakin  |  October 19, 2016

As we mentioned a few times before, we see a lot of “deception as detection” use cases. Frankly, we see nearly all deception projects focused on threat detection (typically of...

Read more »

Digital Security for the Supply Chain

by Mark Atwood  |  October 19, 2016

A digitally vulnerable Supply Chain can lead to disruption of actual operations.  It can also lead to significant damage to brand and reputation, product safety and integrity issues, loss or...

Read more »

Symposium Notes - Day One Features Hadoop

by Merv Adrian  |  October 18, 2016

Gartner Symposium is always exciting, challenging and stimulating for analysts; we get to interact with many organizations in a brief time during 1on1 meetings scheduled based on our coverage. It offers...

Read more »

The New Digital Security Organization

by Earl Perkins  |  October 17, 2016

Information Technology isn't what it used to be, is it? At one point we were focused on a relatively fixed set of infrastructure and software- mainframe computers, mid-range computers, servers,...

Read more »

It's Time to Move on From "What is the Internet of Things" Discussion If You Want to Secure It

by Earl Perkins  |  October 12, 2016

Among Gartner clients we are now beginning to see IoT "definition fatigue" set in as the glitz and excitement surrounding the concept settles into the hard business light of day....

Read more »