Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Webinar Q&A from Modern Network Threat Detection and Response

by Anton Chuvakin  |  February 11, 2019

As promised, here is my lightly edited Q&A from a recent webinar called “Modern Network Threat Detection and Response.” Questions about vendors are removed, and some are edited for clarity....

Read more »

IRM Market Visionaries and Challengers Join Forces to Battle Leaders

by John Wheeler  |  February 11, 2019

In the span of a week, the integrated risk management (IRM) technology market has experienced significant consolidation. Four vendors from Gartner's inaugural 2018 IRM Magic Quadrant have joined forces to evolve their...

Read more »

Our "Solution Path for Implementing Threat Detection and Incident Response" Publishes

by Anton Chuvakin  |  January 22, 2019

As you can see below, we have written a lot of research over the years, and it would be handy to have a roadmap for the readers. This is especially...

Read more »

Upcoming Webinar: Modern Network Threat Detection and Response

by Anton Chuvakin  |  January 21, 2019

Here is my next Gartner webinar; this one is focused on network traffic use for detection and response. Title: Modern Network Threat Detection and Response Date: January 29, 2019 Time:...

Read more »

Open Shares in the Trenches

by Jay Heiser  |  January 4, 2019

Today’s open sharing of sensitive files from the public cloud parallels an information warfare problem from 1916. It should remind us that security always takes a back seat when there’s...

Read more »

Networking Retrospective

by Andrew Lerner  |  January 2, 2019

Around this time of year, many folks take a retrospective look at 2018 and/or make predictions for 2019 (or resolutions). One interesting thing about all these retrospectives is that frankly,...

Read more »

Our 2018 Update for "Endpoint Detection and Response Architecture and Operations Practices" Publishes

by Anton Chuvakin  |  December 14, 2018

Our main EDR document (“Endpoint Detection and Response Architecture and Operations Practices”) was just updated by Jon Amato, and it looks much better now. The abstract states “’Increasing complexity and...

Read more »

Deception vs Analytics, or Can Analytics Catch True Unknown Unknowns?

by Anton Chuvakin  |  December 7, 2018

This is a debate post, and not a position post. The question alluded therein (hey… I said “alluded therein” to sound like Dan Geer, no?) has been bugging us for...

Read more »

My Top 7 Popular Gartner Blog Posts for November 2018

by Anton Chuvakin  |  December 3, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) – for some reason, this paper keeps...

Read more »

On Operational Excellence

by Anton Chuvakin  |  November 28, 2018

So I spent much of last week reading a book about Second World War called “The Second World Wars: How the First Global Conflict Was Fought and Won.“ You do...

Read more »