Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Highlights From Verizon Data Breach Report 2016

by Anton Chuvakin  |  May 4, 2016

Here are my favorite “data-bits”, quotes and fun items from Verizon's 2016 Data Breach Investigations Report: “The Actors in breaches are predominantly external. While this goes against InfoSec folklore, the...

Read more »

One More Time On EDR Use Cases

by Anton Chuvakin  |  May 3, 2016

Our first EDR paper is about to be published, but I wanted to draw your attention to my favorite topic – the use cases. We touched on the EDR (back...

Read more »

EDR Tool Wins - Only For The Enlightened?

by Anton Chuvakin  |  April 25, 2016

We are nearing the end of our Endpoint Detection and Response (EDR) research project; we just pushed our first paper – on EDR operational practices – into review and are...

Read more »

Our "How to Plan and Execute Modern Security Incident Response" Publishes

by Anton Chuvakin  |  April 11, 2016

Our updated security incident response (IR) paper, now renamed “How to Plan and Execute Modern Security Incident Response” (Gartner GTP access required) has just published. Some fun quotes follow below:...

Read more »

Speaking at Gartner Security & Risk Management Summit 2016

by Anton Chuvakin  |  April 8, 2016

Gartner Security & Risk Management Summit 2016 is coming soon and here is my traditional blog post summarizing my speaking at this upcoming event (Washington, DC, June 13-16, 2016). “How...

Read more »

Existing Security Best-Practice Can Handle IoT Exposures?? Not Really

by Earl Perkins  |  April 8, 2016

A recent news article from both a well respected news source and vendor outlined their assurance that IoT security exposures could be taken care of with existing IT-centric security practices...

Read more »

Sad Hilarity of Predictive Analytics in Security?

by Anton Chuvakin  |  March 31, 2016

After spending a week in Siberia, I am ready for more fun blogging – and of course for more drama that is our industry (GO CYBER DRAMA!). In any case,...

Read more »

Anton’s Favorite Threat Hunting Links

by Anton Chuvakin  |  March 21, 2016

Somebody asked me for best resources on THREAT HUNTING, and that reminded me that I wanted to write a linklist blog post on this very topic. Below are some of...

Read more »

EDR Mud Fight: Kernel or Userland?

by Anton Chuvakin  |  March 18, 2016

I am feeling adventurous, so let’s have an EDR mud fight [pillow fight?] – kernel or userland agent? Top Pros Top Cons Kernel mode EDR agent Better resilience vs the...

Read more »