Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

NIST Cybersecurity Framework Supports Use of IRM

by John Wheeler  |  January 9, 2017

2017 brings a new focus and urgency to improving cybersecurity at all levels of our society. While a fierce debate rages in Washington, DC over the cyber-intrusion impact on the...

Read more »

On UEBA / UBA Use Cases

by Anton Chuvakin  |  January 5, 2017

After much agonizing, we (Augusto and myself) have settled on the following list of UEBA / UBA use cases for our upcoming UEBA technology comparison. Here they are: Compromised account...

Read more »

My Top 7 Popular Gartner Blog Posts for December 2016

by Anton Chuvakin  |  January 3, 2017

Most popular blog posts from my Gartner blog during the past month are: Our “Comparison of Endpoint Detection and Response Technologies and Solutions” Paper Publishes (EDR research) SIEM Use Cases...

Read more »

All My Research Published in 2016

by Anton Chuvakin  |  December 22, 2016

To make it easy for my readers to find my research, here is the list of everything I published in 2016 [most co-authored with Augusto Barros]. Gartner GTP access is...

Read more »

The Cybersecurity Talent Shortage.... is a myth?

by Sam Olyaei  |  December 21, 2016

Over the last year, I (along with others on my team) have received numerous inquiries regarding a "talent crisis" that is brewing in the information/cyber security industry.  Organizations continue to...

Read more »

We need to update security regulations

by Lawrence Pingree  |  December 17, 2016

Today's information security regulatory standards are out of date. They need to be updated with more prescriptive guidance. For example, almost all security practitioners know they need updated technologies like...

Read more »

UEBA Clearly Defined, Again?

by Anton Chuvakin  |  December 12, 2016

Ok, so after yet another request to “define UBA | UEBA clearly”, this post was born. First, Gartner “Market Guide for User and Entity Behavior Analytics” (not the research we...

Read more »

What Should Your UEBA Show: Indications or Conclusions?

by Anton Chuvakin  |  December 8, 2016

While starting to research UBA / UEBA and other analytics-related security tools, one interesting paradox has emerged. I’d call it “INSIGHT vs CERTAINTY paradox.” Specifically: Some UEBA users and prospects...

Read more »

My Top 7 Popular Gartner Blog Posts for November 2016

by Anton Chuvakin  |  December 2, 2016

Most popular blog posts from my Gartner blog during the past month are: Our “Comparison of Endpoint Detection and Response Technologies and Solutions” Paper Publishes (EDR research) The Coming UBA...

Read more »

My Top 7 Popular Gartner Blog Posts for October 2016

by Anton Chuvakin  |  November 22, 2016

Most popular blog posts from my Gartner blog during the past month are: Our “Comparison of Endpoint Detection and Response Technologies and Solutions” Paper Publishes (EDR research) SIEM Use Cases...

Read more »