Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

The Digital Marketing Slush Fund

by Andrew Frank  |  August 27, 2015

A CIO, CMO, and CFO walk into a bar. The CFO says, “OK gentlemen, who’s buying?” (Yes, they’re all men.) The CIO points to the CMO and says, “He should,...

Read more »

Inside the Digital Business: paved roads, good intentions, IoT, and Analytics

by Jack Santos  |  August 26, 2015

As the Digital Business takes off, we often focus on external business opportunities - new revenue, new products, and new markets.  But what about internal organizational efficiency?  An article about using...

Read more »

Co-Managed SIEM Rising

by Anton Chuvakin  |  August 24, 2015

I don’t usually blog on specific research … but when I do, it is about SIEM. So, a very interesting piece just went up on the Gartner site. It is...

Read more »

My "Evaluation Criteria for Security Information and Event Management" 2015 Update Publishes

by Anton Chuvakin  |  August 18, 2015

My freshly updated “Evaluation Criteria for Security Information and Event Management” (2015 edition) is up on the Gartner site. Admittedly, it is a relatively minor update, but I have expanded...

Read more »

Speaking at Gartner Security Summit Australia 2015

by Anton Chuvakin  |  August 17, 2015

Gartner Security Summit Australia 2015 is coming soon. Here is my traditional blog post summarizing my speaking at this event (Sydney, Australia - August 24-25, 2015): “Security Incident Response in...

Read more »

Threat Intelligence and Operational Agility

by Anton Chuvakin  |  August 13, 2015

I sometimes say that “threat intel doesn’t help people who don’t help themselves.” Here is one particular example: if you buy the best threat intelligence possible - mixed strategic and...

Read more »

What HAVEN'T We Said About IoT Security So Far?

by Earl Perkins  |  August 10, 2015

If you research Internet of Things (IoT) security daily like many in the analyst industry are doing, you keep reading articles that can be characterized as "admiring the problem". This...

Read more »

Gartner's Brazil Summit Keynote Focuses on Digital Risk

by John Wheeler  |  August 10, 2015

Today, I had the privilege and honor to help kick-off Gartner's 2015 Security and Risk Management Summit in Sao Paulo, Brazil. Joined by my Gartner colleagues Andrew Walls (2014 Gartner Analyst...

Read more »

Revisiting Vulnerability Assessment and Vulnerability Management Research

by Anton Chuvakin  |  August 7, 2015

Together with our new team member, Augusto Barros (blog, Twitter), we have embarked on an update to Gartner GTP vulnerability assessment (VA) and vulnerability management (VM) research. Let me tell...

Read more »

Your SOC Nuclear Triad

by Anton Chuvakin  |  August 4, 2015

Let’s talk modern SOC tools. The analogy I’d like to use is that of a “Nuclear Triad” – a key cold war concept. The triad consisted of strategic bombers, ICBMs...

Read more »