Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

You Cannot Buy Security Operations Maturity But You Can ... Ruin It

by Anton Chuvakin  |  May 22, 2018

In my day job, I ponder all sorts of strange stuff. For example, here is a philosophical one: can one buy security operations maturity? By the way, note that when...

Read more »

Next Research: SOC, SIEM, and Again Overall Detection and Response

by Anton Chuvakin  |  May 21, 2018

We worked too damn hard developing these papers (and one more to come out on this topic), so we will be focusing on updates to our key existing papers next...

Read more »

Our Threat Testing and BAS Papers Are Out!

by Anton Chuvakin  |  May 18, 2018

With much excitement, we are announcing the release of our “magically awesome” ™ papers on security testing methods and Breach and Attack Simulation (BAS) technologies (Gartner GTP access required). Here...

Read more »

We Scan and We Patch, but We Don’t Do Vulnerability Management

by Anton Chuvakin  |  May 14, 2018

Lately, we’ve been flooded with calls about vulnerability management (VM). Many of the calls seem to be from organizations of medium to low security operations maturity, that are just starting...

Read more »

My Top 7 Popular Gartner Blog Posts for April 2018

by Anton Chuvakin  |  May 2, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) <- read the paper or our SOAR...

Read more »

Why POCs Fail and Why You Must POC Anyway!?

by Anton Chuvakin  |  May 1, 2018

A lot of people in the industry assume that we Gartner analysts walk on water … … and we do. We do walk on the churning waters of vendor propaganda,...

Read more »

Cybersecurity Is Critical to the M&A Due Diligence Process

by Sam Olyaei  |  May 1, 2018

Another merger, another acquisition, another breach.... Organizations are exposing themselves to undue risk by overlooking cybersecurity implications during the screening and due diligence process of a M&A transaction. A few...

Read more »

Are You Ready for Some IRM? Gartner's 2018 Security & Risk Summit Events Span the Globe

by John Wheeler  |  April 30, 2018

It's that time of year again! Preparations for our upcoming global summit events are at a fever pitch. A central theme for this year's summit is how integrated risk management...

Read more »

RSA 2018: Not As Messy As Before?

by Anton Chuvakin  |  April 26, 2018

As I am starting to write this, RSA 2018 is not even over yet, but I think I am ready to blog my impressions from this year’s event. As I...

Read more »

SOAR Webinar Questions - Answered

by Anton Chuvakin  |  April 16, 2018

Here are my recent SOAR webinar Q&A (also see webinar recording link, our amazing SOAR paper [Gartner GTP access required, but everybody can see the outline]) The questions are edited...

Read more »