Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Baby’s First Threat Assessment?

by Anton Chuvakin  |  March 14, 2018

Upon reading my previous post, a few of you have wisely pointed out: … but detection of WHAT? How can you talk about the best starter tool for threat detection...

Read more »

The Best Starting Technology for Detection?

by Anton Chuvakin  |  March 6, 2018

We talked about starter detection and response processes, now what about the tools? Namely, tools that help you start your detection and response capability. Here, some “experts” will shout ‘screw...

Read more »

My Top 8 Popular Gartner Blog Posts for February 2018

by John Wheeler  |  March 2, 2018

Not to be outdone by my esteemed colleague Dr. Anton Chuvakin, here are my top 8 blog posts read in February 2018: Gartner's New IRM Magic Quadrant Signals End of GRC Era ...

Read more »

My Top 7 Popular Gartner Blog Posts for Feburary 2018

by Anton Chuvakin  |  March 1, 2018

Most popular blog posts from my Gartner blog during the past month are: SIEM Use Cases – And Other Security Monitoring Use Cases Too! (security monitoring research) Popular SIEM Starter...

Read more »

New Job Alert: Virtual CISO

by Sam Olyaei  |  February 28, 2018

  Are you an Executive/IT leader/CIO with oversight for security? Do you find yourself resource constrained and reactive? Do you have any idea where your critical data lie? How about...

Read more »

How Much of Your Security Gear Is Misconfigured or Not Configured?

by Anton Chuvakin  |  February 23, 2018

Now that we are truly done with SOAR, our Testing Security project continues in full force. This post is a bit contemplative, and related to the question of ‘why test...

Read more »

Our Security Orchestration and Automation (SOAR) Paper Publishes

by Anton Chuvakin  |  February 22, 2018

It is with much excitement that we announce the publication of “Preparing Your Security Operations for Orchestration and Automation Tools”, our epic SOAR paper. Select favorite quotes are: “Test the...

Read more »

IoT Security | NISTIR 8200 in Draft - Act NOW!

by Erik Heidt  |  February 14, 2018

We knew this was coming, and this is a big day in IoT security and risk management. Let's explore why it is important for your organization to take action now,...

Read more »

Back to Basics: Indispensable Security Processes for Detection and Response

by Anton Chuvakin  |  February 8, 2018

For our new research project focused on starting your detection and response effort, we are thinking about an essential bundle of security operations processes needed for such effort. Sort of...

Read more »

Our Updated MSSP and MDR Guidance Publishes

by Anton Chuvakin  |  January 30, 2018

While Augusto may disagree, this is probably one of our top 3 favorite papers we’ve written, and it has been UPDATED. Hello world! Please welcome “How to Work With an...

Read more »