Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Loss of Safe Harbor creates regulatory fragmentation but EU-US data transfers continue

by Earl Perkins  |  October 6, 2015

I would like to introduce you to my colleague and friend Carsten Casper, who has been following today's announcement from the European Union Commission regarding Safe Harbor. He believed this...

Read more »

To GRC, or Not to GRC?

by John Wheeler  |  October 6, 2015

To GRC, or not to GRC? That is the question I posed to risk management & security professionals as I circumnavigated the globe over the past two months. Governance, Risk...

Read more »

Security Planning Guide for 2016

by Anton Chuvakin  |  October 5, 2015

Our team has just released our annual security planning guide: “2016 Planning Guide for Security and Risk Management.” Every GTP customer should go and read it! Its abstract states: “Technical...

Read more »

Security Analytics Webinar Questions - Answered

by Anton Chuvakin  |  September 29, 2015

As promised, I am posting selected Q&A from my recent security analytics webinar (recording is here somewhere). As a reminder, the topics were: How to evolve beyond your SIEM to...

Read more »

Five Basic Forgotten Security Alert Truths

by Anton Chuvakin  |  September 25, 2015

Here is a fun one: everybody whines that organizations have too many alerts, even the makers of the tools that produce alerts. Everybody! Everybody!! Everybody!!! When people whine [which, BTW,...

Read more »

Software Defined Perimeter Technology is More than a Fancy VPN

by Lawrence Pingree  |  September 23, 2015

It's been a while since I've blogged, but I wanted to expand a bit on how Software Defined Perimeter technology works. The key reason that this technology helps reduce the...

Read more »

Security: Automate And/Or Die?

by Anton Chuvakin  |  September 11, 2015

While I generally dislike abstract security debates like "how to be more proactive?", "are we dynamic enough?" and "should we automate more?", some recent experiences made me pick the last...

Read more »

Upcoming Webinar: Demystifying Security Analytics: Data, Methods, Use Cases

by Anton Chuvakin  |  September 4, 2015

I am doing a webinar based on my security analytics research earlier this year (resulting paper [Gartner GTP access required]). This is a great opportunity for those without said access...

Read more »

On Space Between Detection and Response

by Anton Chuvakin  |  August 31, 2015

Let’s ponder the space between Detection (D) and Response (R): D <aim your mind here!> R Do you see it clearly now? Where does DETECTION end and RESPONSE begins? What...

Read more »

The Digital Marketing Slush Fund

by Andrew Frank  |  August 27, 2015

A CIO, CMO, and CFO walk into a bar. The CFO says, “OK gentlemen, who’s buying?” (Yes, they’re all men.) The CIO points to the CMO and says, “He should,...

Read more »