Gartner Blog Network

Category: 'future' Blog Posts

from the Gartner Blog Network

What Is "SIEM+" Or "Can We Have A Cyber Defense Platform?"

by Anton Chuvakin  |  July 6, 2018

Contrary to what some “analytics” or “AI” vendors will have us believe, SIEM in 2018 is not the SIEM of our grandfathers. In 2002, when I was first initiated into...

Read more »

"Do They Have AI?" or That Rant on AI in Security

by Anton Chuvakin  |  March 22, 2018

This post is inspired by a few painful discussions on artificial intelligence (AI) that I had both in public (on Twitter) and internally too. Let’s start with a joke: Q:...

Read more »

SOAR paper is out!

by Augusto Barros  |  February 22, 2018

Anton beat me this time on blogging about our new research, but I'll do it anyway :-) Our document about Security Orchestration, Automation and Response (SOAR) tools includes some interesting...

Read more »

BAS and Red Teams Will Kill The Pentest

by Augusto Barros  |  February 14, 2018

With our research on testing security methods and Breach and Attack Simulation tools (BAS), we ended up with an interesting discussion about the role of the pentest. I think we...

Read more »

My "How to Hunt for Security Threats" Paper Published

by Anton Chuvakin  |  April 6, 2017

My mini-paper on threat hunting is out! Review “How to Hunt for Security Threats” (Gartner GTP access required) and provide feedback here. The abstract states “Technical professionals focused on security...

Read more »

Security in 2025 - Extrapolate or Bust?

by Anton Chuvakin  |  January 27, 2017

What year is this? Still 2017, indeed. So, imagine it is 2025… and 8 years have passed. How is information security (“cyber security”) different in 2025? But before you start...

Read more »

Deception as a Feature

by Augusto Barros  |  September 30, 2016

One of the things we are also covering as part of our research on deception technologies is the inclusion of deception techniques as features in other security products. There are...

Read more »

New Research: Deception Technologies!

by Augusto Barros  |  September 13, 2016

With the work on our upcoming SOC paper and on the TI paper refresh winding down, we are preparing to start some exciting research in our new project: Deception Technologies!...

Read more »

Are Security Monitoring Alerts Becoming Obsolete?

by Augusto Barros  |  July 8, 2016

If I ask anyone working on a SOC about a high level description of their monitoring process, the answer will most likely look like this: "The SIEM generates an alert,...

Read more »

The Secret to Digital Success? Break the Law, but Don't Get Caught...

by Jack Santos  |  April 18, 2016

We've had some discussions about the future of organizations in a digital world, and then reflected on key success points: Uber, Google/YouTube, others.  One of the lessons learned, as voiced...

Read more »