Gartner Blog Network

Category: 'cybersecurity' Blog Posts

from the Gartner Blog Network

Assessing Blockchain Platforms

by Homan Farahmand  |  April 11, 2019

What constitutes a blockchain platform, its design goals, and how that should be assessed have been a source of passionate debate among experts. This can be confusing for technical professionals...

Read more »

Myths of Risk and Cybersecurity Management

by Earl Perkins  |  October 19, 2018

I have been researching and thinking about risk and cybersecurity management concepts for the last year or so, and I wanted to share with you some initial conclusions I've reached...

Read more »

Comments: 1

The M&M theory of PCI DSS

by Jonathan Care  |  October 10, 2018

There's a great story about Van Halen. In their contract rider they insisted that they get a bowl of M&M candy with all of the brown ones removed before the...

Read more »

Comments: 3

Does Decentralized Identity Need an Identity Neutrality Manifesto

by Homan Farahmand  |  July 12, 2018

If you are not familiar with the decentralized identity, you can start here. The promise of decentralized identity – self-sovereign identity in the case of people identity – is to...

Read more »

Cybersecurity Is Critical to the M&A Due Diligence Process

by Sam Olyaei  |  May 1, 2018

Another merger, another acquisition, another breach.... Organizations are exposing themselves to undue risk by overlooking cybersecurity implications during the screening and due diligence process of a M&A transaction. A few...

Read more »

Decentralized Identity Hard Work Begins

by Homan Farahmand  |  February 15, 2018

Gartner introduced the decentralized identity (DID) conceptual architecture in "Blockchain: The Dawn of Decentralized Identity [1]," which was published in September 2016. In a decentralized identity model, users generate and manage their own...

Read more »

The Death of IoT Security As You Know It

by Earl Perkins  |  December 7, 2017

There is a topic that I wanted to share with you that we at Gartner have delivered research on during 2017. We have been developing research on the topic for...

Read more »

Cyber-attacks to the left, ransomware to the right - we need to spend money on what?

by Jonathan Care  |  June 27, 2017

With the news that a new outbreak of malware is sweeping the globe, it turns out that many organisations are not prepared for the determined and resourced attackers that we...

Read more »

After WannaCry, what next?

by Jonathan Care  |  June 12, 2017

WannaCry (using the purloined exploit kit ETERNALBLUE) was paused, for now.  Heroic efforts from security practitioners around the world (and a congratulations to @malwaretech for finding the "kill switch" domain!)...

Read more »

After WannaCry 1.0 comes the WannaScammer

by Jonathan Care  |  May 18, 2017

I've received reports about scams like the one featured in this blog post. The scammers have cleverly reproduced the domain and email address, making it look like the email legitimately...

Read more »