Gartner Blog Network

Category: 'security-of-applications-and-data' Blog Posts

from the Gartner Blog Network

Don’t Wait to Establish Container Image Governance When Scaling Kubernetes Deployments

by Tony Iams  |  June 19, 2020

The rate of client inquiries that Gartner is receiving about containers and Kubernetes has been steadily increasing, and these discussions reveal that enterprises are now deploying Kubernetes at greater scale...

Read more »

GDPR Requires IRM For Fast and Effective Response

by John A. Wheeler  |  September 14, 2018

This week, Gartner hosted its annual Security & Risk Management Summit in London and the buzz at the event centered on the new risks associated with the General Data Protection...

Read more »

Cybersecurity Is Critical to the M&A Due Diligence Process

by Sam Olyaei  |  May 1, 2018

Another merger, another acquisition, another breach.... Organizations are exposing themselves to undue risk by overlooking cybersecurity implications during the screening and due diligence process of a M&A transaction. A few...

Read more »

My Top 8 Popular Gartner Blog Posts for February 2018

by John A. Wheeler  |  March 2, 2018

Not to be outdone by my esteemed colleague Dr. Anton Chuvakin, here are my top 8 blog posts read in February 2018: Gartner's New IRM Magic Quadrant Signals End of GRC Era ...

Read more »

New Job Alert: Virtual CISO

by Sam Olyaei  |  February 28, 2018

  Are you an Executive/IT leader/CIO with oversight for security? Do you find yourself resource constrained and reactive? Do you have any idea where your critical data lie? How about...

Read more »