Gartner Blog Network

Tag: 'information-security' Blog Posts

from the Gartner Blog Network

How Is Cyber Security Like a Hummer?

by John Wheeler  |  May 29, 2015

In my previous blog post, I utilized the analogy of a race car vs. an armored car to demonstrate the need for a "Risk First, Security Second" approach to cyber...

Read more »

To Finish First in Digital Business, Security Must Be Second

by John Wheeler  |  May 19, 2015

This weekend, the famous Indianapolis 500 will be run for the 99th time with a slate of more than 30 race cars competing to win the "Greatest Spectacle in Racing"....

Read more »

Seven Ways to IT Risk Management Success

by John Wheeler  |  April 1, 2015

With all the hype and hysteria around the mounting cyber-security threats, companies are seeking to strengthen their management of IT risk. The Wall Street Journal reported last week that some...

Read more »

What Is In Your GRC "Junk Drawer"?

by John Wheeler  |  March 3, 2015

Everyone has one. Somewhere in their kitchen or garage is the infamous "junk drawer". Over time, the drawer fills up with gadgets, tools, scraps of paper with to do lists...

Read more »

Five Tips for Companies Considering Cyber Insurance

by John Wheeler  |  March 2, 2015

As cyber attacks and data breaches are surfacing on a daily basis, our clients are looking for ways to mitigate the risk associated with these events. One of the most...

Read more »

Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company

by John Wheeler  |  October 6, 2014

In the news today, social media risks for individuals are certainly grabbing the headlines. Celebrity hacking, child exploitation, identity theft and fraud, just to name a few. However, the risks...

Read more »

Women in Information Security and Risk Management Have A Lot To Say About The Profession and Their Role In It

by Roberta Witty  |  July 8, 2014

At the 2014 Gartner Security and Risk Management Summit at National Harbor, MD, an inaugural session on women in Information Security and Risk Management was conducted. We thought it would...

Read more »

The Rising Prominence of Risk Management

by John Wheeler  |  March 21, 2014

With all the current hype around big data and analytics, I recently decided to explore how risk management has grown in popularity using a unique big data analytic tool - Google's...

Read more »

Incident Response: The Death of a Straight Line

by Anton Chuvakin  |  June 5, 2013

As I am diving deeper into modern security incident response (IR) practices, one shocking realization reigns supreme: the arrow is dead.  Well, let me take this back: as we all...

Read more »

Is Antivirus Obsolete?

by Neil Macdonald  |  September 13, 2012

I blogged about this question years ago, but a recent blog on CSO got me thinking once again. Has anything changed? Thoughts: 1) The question “Has antivirus outlived its value?”...

Read more »