Gartner Blog Network

Category: 'security' Blog Posts

from the Gartner Blog Network

The Other Security Chasm

by Anton Chuvakin  |  April 5, 2019

You guys recall my security chasm post from 2014? Because clearly some of you obsessively reread what I wrote 5 years ago … not :-) That post basically built on...

Read more »

Psychoanalyzing Security Cloud Fears

by Anton Chuvakin  |  March 20, 2019

Here is a funny one: why so many security professionals (and leaders) still hate the cloud? OK, OK, I get it, many of you want to respond to this with...

Read more »

4 Reasons Why GRC Is a Useless Term

by John Wheeler  |  March 6, 2019

It has been 5 years since Gartner embarked on the journey to enhance our coverage of the risk management technology marketplace. That journey included in-depth survey research and countless interactions...

Read more »

IRM Market Visionaries and Challengers Join Forces to Battle Leaders

by John Wheeler  |  February 11, 2019

In the span of a week, the integrated risk management (IRM) technology market has experienced significant consolidation. Four vendors from Gartner's inaugural 2018 IRM Magic Quadrant have joined forces to evolve their...

Read more »

Open Shares in the Trenches

by Jay Heiser  |  January 4, 2019

Today’s open sharing of sensitive files from the public cloud parallels an information warfare problem from 1916. It should remind us that security always takes a back seat when there’s...

Read more »

Networking Retrospective

by Andrew Lerner  |  January 2, 2019

Around this time of year, many folks take a retrospective look at 2018 and/or make predictions for 2019 (or resolutions). One interesting thing about all these retrospectives is that frankly,...

Read more »

Myths of Risk and Cybersecurity Management

by Earl Perkins  |  October 19, 2018

I have been researching and thinking about risk and cybersecurity management concepts for the last year or so, and I wanted to share with you some initial conclusions I've reached...

Read more »

Recent Cyber Attacks Demonstrate Why IRM is Critical for ERM Success

by John Wheeler  |  October 12, 2018

In the last few weeks, several global shipping ports have been targeted with major cyber attacks. Ports in San Diego, California and Barcelona, Spain experienced significant business disruption as a...

Read more »

2018 IoT Endpoint Security Assessment Services Survey

by Erik Heidt  |  August 30, 2018

2018 has seen a significant uptick in Gartner clients asking for help identifying security services in support of their IoT efforts. At this time I don't believe there is sufficient demand to make...

Read more »

2 Success Factors Every Top IRM Tech Solution Must Deliver

by John Wheeler  |  June 29, 2018

Have you ever been driving your car down the road when you notice the ride is bumpier than usual? Or perhaps, the car strangely veers to the right or the...

Read more »