Gartner Blog Network

Category: 'sharing' Blog Posts

from the Gartner Blog Network

Essential Processes Around Endpoint Threat Detection & Response Tools

by Anton Chuvakin  |  July 31, 2013

Just as network forensics tools (NFT), SIEM and DLP, Endpoint Threat Detection & Response Tools (ETDR) tools are not of the “deploy-and-forget” variety (far from it!). The tools require a...

Read more »

Our Security Data Sharing Paper Publishes

by Anton Chuvakin  |  June 19, 2013

It's with great excitement that I announce the publication of our paper “Information Sharing as an Industry Imperative to Improve Security.” It took a lot of research and a lot...

Read more »

From IPs to TTPs

by Anton Chuvakin  |  April 4, 2013

“Here is a ‘bad’ IP – let’s ACL the sucker!” thinking is many people’s first experience with technical shared security data. However, as I pointed out in my previous blog...

Read more »

Consumption of Shared Security Data

by Anton Chuvakin  |  March 22, 2013

The theme of "your detection is my prevention", whispered among The Enlightened Few of security data sharing, works as a good motivator for both sharing and consuming the shared security...

Read more »

On Trust in Security Data Sharing

by Anton Chuvakin  |  February 20, 2013

One of the key, absolutely key, factors in sharing of security-relevant information (be it IOCs, custom malware, detection specifics or “breach” costs) between organizations is TRUST.  Even if an organization...

Read more »

On Security Data Sharing Research

by Anton Chuvakin  |  February 10, 2013

As I promised in my post On Security Data Sharing, we are starting a new research project on information security data sharing. Specifically, our research (joint with Dan Blum) will...

Read more »