Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Fortifying Supply Chain Cybersecurity

by Mark Atwood  |  August 16, 2019

Cybersecurity is not just an IT issue. There are potentially major weaknesses in the supply chain that must be addressed, or supply chain leaders put their companies at significant risk....

Read more »

Kick off - Process, Application and System Behavioral Monitoring Research Initiative

by Lawrence Pingree  |  July 10, 2019

Hi Folks, Been a while since I've blogged on the Gartner blog network. I am working on a new research initiative for product managers and product innovators. I'm delving into...

Read more »

Should You Buy a Piece of SIEM?

by Anton Chuvakin  |  May 31, 2019

We lament that people love to buy single-purpose security tools and then complain about it, but what about buying components of tools? For example, will you buy a normalization engine...

Read more »

Is Vulnerability Management Hopeless?

by Anton Chuvakin  |  May 29, 2019

As card-carrying “cyber” security professionals, we have a compulsion to share and revel in depressing news, at least once in a while. Here is my contribution today: is vulnerability management...

Read more »

Secure The Wrong Path or Change The Path?

by Anton Chuvakin  |  May 24, 2019

How do I configure a firewall appliance in public IaaS? How do I install anti-virus inside a container? How do I filter calls to microservices via an appliance in my...

Read more »

Migrating from Your SIEM to a New One

by Anton Chuvakin  |  May 13, 2019

Many years ago, in 2011, I wrote this blog post on SIEM migration, called “How to Replace a SIEM?” I was a consultant at that time and I helped some...

Read more »

Our "Assessing the Impact of Machine Learning on Security" Published

by Anton Chuvakin  |  May 6, 2019

Here is a fun one: our new paper “Assessing the Impact of Machine Learning on Security” just went up. It contains [the product of the] brains of at least 2...

Read more »

Upcoming Vulnerability Management Research

by Anton Chuvakin  |  May 2, 2019

Given the long lead times for Vendor Briefings, here is our pre-announcement. Short summary: vulnerability management research is coming! Again! Our AAA all-star team (that is Augusto, Anna and me)...

Read more »

Rule Based Detection?

by Anton Chuvakin  |  April 30, 2019

One of the famous insults that security vendors use against competitors nowadays is “RULE – BASED.” In essence, if you want to insult your peers who, in your estimation, don’t...

Read more »

Does Fake Cloud Matter?

by Anton Chuvakin  |  April 11, 2019

Following on the cloud theme from “Psychoanalyzing Security Cloud Fears”, here is another one: does fake cloud matter? First, what is FAKE CLOUD? The classic and most crisp fake cloud...

Read more »