Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Is your security program a roadblock?Read Now

Cloud Security Monitoring ... Revisited (aka It Is Not 2012 Anymore!)

by Anton Chuvakin  |  May 26, 2015

My next project, now that I am done with security analytics for now, is to revisit our cloud security monitoring work. Specifically, some of you remember my 2012 (!) paper...

Read more »

To Finish First in Digital Business, Security Must Be Second

by John Wheeler  |  May 19, 2015

This weekend, the famous Indianapolis 500 will be run for the 99th time with a slate of more than 30 race cars competing to win the "Greatest Spectacle in Racing"....

Read more »

Highlights From Verizon Data Breach Report 2015

by Anton Chuvakin  |  May 18, 2015

With RSA 2015 and some writing deadlines (while analysts generally enjoy stress-free living, we do have deadlines too!), I almost forgot to study the Verizon’s jam-packed-with-juicy-awesomeness DBIR 2015. Here are...

Read more »

My "Demystifying Security Analytics: Sources, Methods and Use Cases" Paper Publishes

by Anton Chuvakin  |  May 8, 2015

With much trepidation, I am announcing the release of my “Demystifying Security Analytics: Sources, Methods and Use Cases” – a paper that took a few months of work to complete....

Read more »

My Top 7 Popular Gartner Blog Posts for April 2015

by Anton Chuvakin  |  May 4, 2015

Most popular blog posts from my Gartner blog during the past month are: The Future Is Here … And It Is … Network? Endpoint? (musings posts) Popular SIEM Starter Use...

Read more »

Do We Know What We Want from IGA Analytics?

by Brian Iverson  |  May 1, 2015

This is the eleventh installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »

Dear IAM Leaders: HR Is Your Frenemy

by Brian Iverson  |  April 30, 2015

Many IAM initiatives start out with the vision of tying human resources more closely with the IT infrastructure to streamline management of user access. It seems to make sense at...

Read more »

RSA 2015: Rise of Chaos!!

by Anton Chuvakin  |  April 30, 2015

Here is my traditional RSA (#RSAC) reflection post for RSA 2015 Conference - all my personal opinions/impressions/thoughts, of course. Keyword of the year: ADVANCED. Nearly every booth had something advanced...

Read more »

Are Software Defined Perimeters (SDP) in your Future?

by Lawrence Pingree  |  April 30, 2015

Increasingly, we are seeing solutions emerge to address advanced threats that have penetrated the internal network (even internal threats) - most solutions focus on micro-segmentation,  network behavior analysis or multi-domain analytics....

Read more »

Auditing Is IGA's New Kid on the Block

by Brian Iverson  |  April 29, 2015

This is the tenth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »