Gartner Blog Network

Category: 'cybersecurity' Blog Posts

from the Gartner Blog Network

Assessing Blockchain Platforms

by Homan Farahmand  |  April 11, 2019

What constitutes a blockchain platform, its design goals, and how that should be assessed have been a source of passionate debate among experts. This can be confusing for technical professionals...

Read more »

Myths of Risk and Cybersecurity Management

by Earl Perkins  |  October 19, 2018

I have been researching and thinking about risk and cybersecurity management concepts for the last year or so, and I wanted to share with you some initial conclusions I've reached...

Read more »

Comments: 1

The M&M theory of PCI DSS

by Jonathan Care  |  October 10, 2018

There's a great story about Van Halen. In their contract rider they insisted that they get a bowl of M&M candy with all of the brown ones removed before the...

Read more »

Comments: 3

Does Decentralized Identity Need an Identity Neutrality Manifesto

by Homan Farahmand  |  July 12, 2018

If you are not familiar with the decentralized identity, you can start here. The promise of decentralized identity – self-sovereign identity in the case of people identity – is to...

Read more »

Cybersecurity Is Critical to the M&A Due Diligence Process

by Sam Olyaei  |  May 1, 2018

Another merger, another acquisition, another breach.... Organizations are exposing themselves to undue risk by overlooking cybersecurity implications during the screening and due diligence process of a M&A transaction. A few...

Read more »

Decentralized Identity Hard Work Begins

by Homan Farahmand  |  February 15, 2018

Gartner introduced the decentralized identity (DID) conceptual architecture in "Blockchain: The Dawn of Decentralized Identity [1]," which was published in September 2016. In a decentralized identity model, users generate and manage their own...

Read more »