Gartner Blog Network

Augusto Barros
Research VP
3 years at Gartner
21 years IT Industry

Augusto Barros is Research VP in the Gartner for Technical Professionals (GTP) Security and Risk Management group. Read Full Bio

New Research: Open Source Tools!

by Augusto Barros  |  April 17, 2020

After finishing the wave of research that covered pentesting, monitoring use cases, SOAR and TI, I’m excited to start research for a net new document covering an exciting topic rarely covered in Gartner research: Open source tools! The intent is to look at the most popular open source tools used by security operations teams out […]

Read more »

Developing and Maintaining Security Monitoring Use Cases

by Augusto Barros  |  April 9, 2020

My favorite Gartner paper has just been updated to its 3rd version! “How to Develop and Maintain Security Monitoring Use Cases” was originally published in 2016 as a guidance framework for organizations trying to identify what their security tools should be looking for, and how to turn these ideas into signatures, rules and other content. […]

Read more »

New Research on Threat Intelligence and SOAR

by Augusto Barros  |  March 31, 2020

Since my blogging whip was gone I haven’t been posting as frequently as I’d like, but I realized we had recently published new versions of some of our coolest research and I completely missed announcing them here! So let me talk a bit about them: The first one is a big update to our Threat […]

Read more »

Updated Paper on Penetration Testing and Red Teams

by Augusto Barros  |  January 29, 2020

I finally managed to publish the update to my paper on pentesting, “Using Penetration Testing and Red Teams to Assess and Improve Security”. It has some small tweaks from the previous version, including some additional guidance around Breach and Attack Simulation tools role. Questions about how to define the scope of penetration tests are very […]

Read more »

The New Vulnerability Management Guidance Framework

by Augusto Barros  |  October 25, 2019

After a huge delay I can finally announce that the new version of our Vulnerability Management Guidance Framework is out! Although it is a refresh of a document that has gone through many updates (even before my Gartner time), this one has some very nice new stuff to mention. First, we refreshed our VM cycle […]

Read more »

Our New Research on Incident Response Has Been Published

by Augusto Barros  |  October 15, 2019

We finally managed to publish our great new (in fact, refreshed) document on preparing for incident response, “How to Implement a Computer Security Incident Response Program”. This is the first document of my colleague Michael Clark, who did a terrific job of modernizing some stuff from a long time ago. Some interesting pieces from this […]

Read more »

Presenting at the Gartner Security and Risk Management Summit DC 2019

by Augusto Barros  |  June 17, 2019

This is literally a last minute blog post about my sessions at this year’s Gartner Security and Risk Management Summit. This time I have three sessions: Tuesday 18, 2:30PM – Debate: Changing Societal Perception of Cybersecurity: This is a very fun debate with my colleague Paul Proctor, where we discuss the need to change society’s perception […]

Read more »

Considering Remediation Approaches For Vulnerability Prioritization

by Augusto Barros  |  May 2, 2019

As Anton said, we are starting our work on vulnerability management this year. One of the points I’ve started to look at more carefully is how much the different patching approaches can affect how we prioritize vulnerabilities for remediation. Expanding the prioritization of vulnerabilities to go beyond CVSS and include threat context is something we […]

Read more »

The Deception Paper Update is Out!

by Augusto Barros  |  February 22, 2019

Good thing about when Anton is away is I’m always able to jump and announce our new research ahead of him 🙂 So, the update to our “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” paper has finally been published. This is a minor update, but as with every updated paper, it […]

Read more »

More on “AI for cybersecurity”

by Augusto Barros  |  January 4, 2019

There is a very important point to understand about the vendors using ML for threat detection. Usually ML is used to identify known behavior, but with variable parameters. What does that mean? It means that many times we know what bad looks like, but not how exactly it looks like. For example, we know that […]

Read more »