Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Open Shares in the Trenches

by Jay Heiser  |  January 4, 2019

Today’s open sharing of sensitive files from the public cloud parallels an information warfare problem from 1916. It should remind us that security always takes a back seat when there’s...

Read more »

Networking Retrospective

by Andrew Lerner  |  January 2, 2019

Around this time of year, many folks take a retrospective look at 2018 and/or make predictions for 2019 (or resolutions). One interesting thing about all these retrospectives is that frankly,...

Read more »

Our 2018 Update for "Endpoint Detection and Response Architecture and Operations Practices" Publishes

by Anton Chuvakin  |  December 14, 2018

Our main EDR document (“Endpoint Detection and Response Architecture and Operations Practices”) was just updated by Jon Amato, and it looks much better now. The abstract states “’Increasing complexity and...

Read more »

Deception vs Analytics, or Can Analytics Catch True Unknown Unknowns?

by Anton Chuvakin  |  December 7, 2018

This is a debate post, and not a position post. The question alluded therein (hey… I said “alluded therein” to sound like Dan Geer, no?) has been bugging us for...

Read more »

My Top 7 Popular Gartner Blog Posts for November 2018

by Anton Chuvakin  |  December 3, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) – for some reason, this paper keeps...

Read more »

On Operational Excellence

by Anton Chuvakin  |  November 28, 2018

So I spent much of last week reading a book about Second World War called “The Second World Wars: How the First Global Conflict Was Fought and Won.“ You do...

Read more »

Is Encryption an NTA / NIDS / NFT Apocalypse?

by Anton Chuvakin  |  November 16, 2018

Here is a funny one: does pervasive traffic encryption KILL Network Traffic Analysis (NTA) dead? Well, OK, not truly “kill it dead,” but push it back to 2002 when it...

Read more »

Our "How to Operate and Evolve a SIEM Solution" Publishes

by Anton Chuvakin  |  November 7, 2018

We just published the second part of our SIEM guidance, “How to Operate and Evolve a SIEM Solution.” Our readers may recognize some of the content from our world-famous “Security...

Read more »

Let’s Go Fight IT for Logs? Agents? Taps?

by Anton Chuvakin  |  November 1, 2018

This is a depressing post about security in the real world (what … another one?) In any case, we are having those enlightened debates about log analysis (via SIEM/UEBA), network...

Read more »

My Top 7 Popular Gartner Blog Posts for October 2018

by Anton Chuvakin  |  November 1, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) – for some reason, this paper keeps...

Read more »