Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Kick off - Process, Application and System Behavioral Monitoring Research Initiative

by Lawrence Pingree  |  July 10, 2019

Hi Folks, Been a while since I've blogged on the Gartner blog network. I am working on a new research initiative for product managers and product innovators. I'm delving into...

Read more »

Should You Buy a Piece of SIEM?

by Anton Chuvakin  |  May 31, 2019

We lament that people love to buy single-purpose security tools and then complain about it, but what about buying components of tools? For example, will you buy a normalization engine...

Read more »

Is Vulnerability Management Hopeless?

by Anton Chuvakin  |  May 29, 2019

As card-carrying “cyber” security professionals, we have a compulsion to share and revel in depressing news, at least once in a while. Here is my contribution today: is vulnerability management...

Read more »

Secure The Wrong Path or Change The Path?

by Anton Chuvakin  |  May 24, 2019

How do I configure a firewall appliance in public IaaS? How do I install anti-virus inside a container? How do I filter calls to microservices via an appliance in my...

Read more »

Migrating from Your SIEM to a New One

by Anton Chuvakin  |  May 13, 2019

Many years ago, in 2011, I wrote this blog post on SIEM migration, called “How to Replace a SIEM?” I was a consultant at that time and I helped some...

Read more »

Our "Assessing the Impact of Machine Learning on Security" Published

by Anton Chuvakin  |  May 6, 2019

Here is a fun one: our new paper “Assessing the Impact of Machine Learning on Security” just went up. It contains [the product of the] brains of at least 2...

Read more »

Upcoming Vulnerability Management Research

by Anton Chuvakin  |  May 2, 2019

Given the long lead times for Vendor Briefings, here is our pre-announcement. Short summary: vulnerability management research is coming! Again! Our AAA all-star team (that is Augusto, Anna and me)...

Read more »

Rule Based Detection?

by Anton Chuvakin  |  April 30, 2019

One of the famous insults that security vendors use against competitors nowadays is “RULE – BASED.” In essence, if you want to insult your peers who, in your estimation, don’t...

Read more »

Does Fake Cloud Matter?

by Anton Chuvakin  |  April 11, 2019

Following on the cloud theme from “Psychoanalyzing Security Cloud Fears”, here is another one: does fake cloud matter? First, what is FAKE CLOUD? The classic and most crisp fake cloud...

Read more »

The Other Security Chasm

by Anton Chuvakin  |  April 5, 2019

You guys recall my security chasm post from 2014? Because clearly some of you obsessively reread what I wrote 5 years ago … not :-) That post basically built on...

Read more »