Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Myths of Risk and Cybersecurity Management

by Earl Perkins  |  October 19, 2018

I have been researching and thinking about risk and cybersecurity management concepts for the last year or so, and I wanted to share with you some initial conclusions I've reached...

Read more »

Our "How to Architect and Deploy a SIEM Solution" Publishes

by Anton Chuvakin  |  October 18, 2018

We just published our “How to Architect and Deploy a SIEM Solution” paper. Avid readers of our research will recognize that some of the content actually comes from our world-famous...

Read more »

Network Anomaly Detection Track Record in Real Life?

by Anton Chuvakin  |  October 15, 2018

As I allude here, my long-held impression is that no true anomaly-based network IDS (NIDS) has ever been successful commercially and/or operationally. There were some bits of success, to be...

Read more »

Recent Cyber Attacks Demonstrate Why IRM is Critical for ERM Success

by John Wheeler  |  October 12, 2018

In the last few weeks, several global shipping ports have been targeted with major cyber attacks. Ports in San Diego, California and Barcelona, Spain experienced significant business disruption as a...

Read more »

My Top 7 Popular Gartner Blog Posts for September 2018

by Anton Chuvakin  |  October 2, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) SIEM Use Cases – And Other Security...

Read more »

Can We Have NDR, Please?

by Anton Chuvakin  |  September 28, 2018

We have EDR (thanks Anton!), but can we also have NDR – if only to make the world of acronyms more consistent? Instead, today we have NIDS (detection that is...

Read more »

NTA: The Other IDS?

by Anton Chuvakin  |  September 20, 2018

Have you ever wondered why academic literature - however silly much of infosec academic research is - always talks about “signature-based IDS” (“misuse”) and “anomaly-based IDS” (“abuse”), but most industry...

Read more »

Our 2018 Update to "How to Plan, Design, Operate and Evolve a SOC" Publishes

by Anton Chuvakin  |  September 17, 2018

As Augusto already announced awhile ago, we have updated our “how to SOC” paper for 2018. His post even includes our main guidance visual (!), made that much more awesome...

Read more »

My Top 7 Popular Gartner Blog Posts for August 2018

by Anton Chuvakin  |  September 13, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) SIEM Use Cases – And Other Security...

Read more »

Next Research: Deception and Network Traffic Analysis

by Anton Chuvakin  |  September 6, 2018

While I am away at the Summit, I wanted to whip up a very quick blog post announcing our Q4 2018 research plans. Given how long Vendor Briefing lead times...

Read more »