Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Incident Response Becomes Threat Response ... OR Does It: IR Research Commencing

by Anton Chuvakin  |  February 5, 2016

As planned, we are starting our research effort on EDR, but also one on security incident response (IR), a topic we last touched in 2013. Most likely, we will be...

Read more »

What's Next After the Internet of Things?

by Earl Perkins  |  February 1, 2016

A belated Happy New Year to everyone! I am not much for writing of the "Top 5" or "Top 10" Big Things that happened in 2015, so you didn't hear...

Read more »

EDR Research Commencing: Call To Action!

by Anton Chuvakin  |  January 27, 2016

As we mentioned in this post, we are about the visit the land of EDR (formerly: ETDR) in order to update Gartner GTP EDR coverage and to create one new...

Read more »

“Accelerating R&D” Key Initiatives for Life Science Manufacturers 2016

by Michael Shanler  |  January 27, 2016

Before each calendar year begins, we put a lot of effort into outlining areas of research and how these areas align with strategic key initiatives (KIs).  The life science-related  KIs...

Read more »

No, Virginia, It Does NOT Mean That!

by Anton Chuvakin  |  January 25, 2016

This is a post to finally put this idiocy to rest: “If you can DETECT, why can’t you PREVENT!?” Here are my top 5 reasons why DETECTION excellence does NOT...

Read more »

"Deception as Detection" or Give Deception a Chance?

by Anton Chuvakin  |  January 8, 2016

Many industry observers have noticed that deception approaches are re-emerging in the collective attention of the operational [as opposed to research] security industry and community (“cyber”- community?). We even have...

Read more »

2015 Healthcare Breach Trends. The Wild West of Healthcare Data.

by Jack Santos  |  January 7, 2016

This is my 6th year of analyzing healthcare breaches reported to HHS.  This has become a tradition, and I don't profess it to be an exacting science - some rather...

Read more »

Jumping Security Maturity FAIL!

by Anton Chuvakin  |  January 6, 2016

Strategic threat intel before patching? Malware reversing before firewalls? Honeypots before NIPS? Are you freaking insane?! Well, are you? Why are you doing this? What good do you think it...

Read more »

All My Research Published in 2015

by Anton Chuvakin  |  January 5, 2016

To make it easy for my readers to find my recent research, here is the list of everything I published in 2015: Vulnerability assessment and vulnerability management (VA / VM):...

Read more »

A Quick Update on Our Research

by Anton Chuvakin  |  December 29, 2015

Since some of you are asking, here is what is cooking…. Just done: vulnerability assessment and vulnerability management (finished Nov 2015) “How to Implement Enterprise Vulnerability Assessment” “A Guidance Framework...

Read more »