Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Migrating from Your SIEM to a New One

by Anton Chuvakin  |  May 13, 2019

Many years ago, in 2011, I wrote this blog post on SIEM migration, called “How to Replace a SIEM?” I was a consultant at that time and I helped some...

Read more »

Our "Assessing the Impact of Machine Learning on Security" Published

by Anton Chuvakin  |  May 6, 2019

Here is a fun one: our new paper “Assessing the Impact of Machine Learning on Security” just went up. It contains [the product of the] brains of at least 2...

Read more »

Upcoming Vulnerability Management Research

by Anton Chuvakin  |  May 2, 2019

Given the long lead times for Vendor Briefings, here is our pre-announcement. Short summary: vulnerability management research is coming! Again! Our AAA all-star team (that is Augusto, Anna and me)...

Read more »

Rule Based Detection?

by Anton Chuvakin  |  April 30, 2019

One of the famous insults that security vendors use against competitors nowadays is “RULE – BASED.” In essence, if you want to insult your peers who, in your estimation, don’t...

Read more »

Does Fake Cloud Matter?

by Anton Chuvakin  |  April 11, 2019

Following on the cloud theme from “Psychoanalyzing Security Cloud Fears”, here is another one: does fake cloud matter? First, what is FAKE CLOUD? The classic and most crisp fake cloud...

Read more »

The Other Security Chasm

by Anton Chuvakin  |  April 5, 2019

You guys recall my security chasm post from 2014? Because clearly some of you obsessively reread what I wrote 5 years ago … not :-) That post basically built on...

Read more »

Psychoanalyzing Security Cloud Fears

by Anton Chuvakin  |  March 20, 2019

Here is a funny one: why so many security professionals (and leaders) still hate the cloud? OK, OK, I get it, many of you want to respond to this with...

Read more »

Canned Playbooks: Are They Realistic?

by Anton Chuvakin  |  March 15, 2019

One of the new ideas we had for a 2019 research paper is something clients often (well, often–ish) ask about: what to do if you encounter a particular threat or...

Read more »

4 Reasons Why GRC Is a Useless Term

by John Wheeler  |  March 6, 2019

It has been 5 years since Gartner embarked on the journey to enhance our coverage of the risk management technology marketplace. That journey included in-depth survey research and countless interactions...

Read more »

My Top 7 Popular Gartner Blog Posts for February 2019

by Anton Chuvakin  |  March 4, 2019

Most popular blog posts from my Gartner blog during the past month were: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) – for some reason, this paper keeps...

Read more »