Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

How a Lower Maturity Security Organization Can Use Threat Intel?

by Anton Chuvakin  |  May 16, 2016

As we mentioned, we are starting a refresh effort for our threat intelligence paper [Gartner GTP access required]. One thing we may add is more detailed guidance on the usage...

Read more »

New Research Starting Soon: Threat Intel, SOC, etc

by Anton Chuvakin  |  May 11, 2016

Our EDR research is winding down, so we are about to start our next cycle, here is what we have in mind. THREAT INTELLIGENCE TOPIC: An update to our “How...

Read more »

Our "Understanding Insider Threats" Paper Publishes

by Anton Chuvakin  |  May 9, 2016

Very few of you knew that we’ve been “secretly” working on a report dedicated to the insider threat – for the last year or so. We had a few false...

Read more »

Highlights From Verizon Data Breach Report 2016

by Anton Chuvakin  |  May 4, 2016

Here are my favorite “data-bits”, quotes and fun items from Verizon's 2016 Data Breach Investigations Report: “The Actors in breaches are predominantly external. While this goes against InfoSec folklore, the...

Read more »

One More Time On EDR Use Cases

by Anton Chuvakin  |  May 3, 2016

Our first EDR paper is about to be published, but I wanted to draw your attention to my favorite topic – the use cases. We touched on the EDR (back...

Read more »

EDR Tool Wins - Only For The Enlightened?

by Anton Chuvakin  |  April 25, 2016

We are nearing the end of our Endpoint Detection and Response (EDR) research project; we just pushed our first paper – on EDR operational practices – into review and are...

Read more »

Our "How to Plan and Execute Modern Security Incident Response" Publishes

by Anton Chuvakin  |  April 11, 2016

Our updated security incident response (IR) paper, now renamed “How to Plan and Execute Modern Security Incident Response” (Gartner GTP access required) has just published. Some fun quotes follow below:...

Read more »

Speaking at Gartner Security & Risk Management Summit 2016

by Anton Chuvakin  |  April 8, 2016

Gartner Security & Risk Management Summit 2016 is coming soon and here is my traditional blog post summarizing my speaking at this upcoming event (Washington, DC, June 13-16, 2016). “How...

Read more »

Existing Security Best-Practice Can Handle IoT Exposures?? Not Really

by Earl Perkins  |  April 8, 2016

A recent news article from both a well respected news source and vendor outlined their assurance that IoT security exposures could be taken care of with existing IT-centric security practices...

Read more »