Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Highlights from Verizon DBIR 2018

by Anton Chuvakin  |  June 15, 2018

Here is my traditional “reading the DBIR aloud” (i.e with quotes shared) post. Read the entire thing, BTW, and not only my favorites below: “Incident: A security event that compromises...

Read more »

10 Years of Cloud Security

by Jay Heiser  |  June 1, 2018

10 years ago this week, Gartner released Assessing the Security Risks of Cloud Computing  Although we had written several research notes in 2007 discussing SaaS security, the 2008 note co-authored...

Read more »

Cybersecurity Is Critical to the M&A Due Diligence Process

by Sam Olyaei  |  May 1, 2018

Another merger, another acquisition, another breach.... Organizations are exposing themselves to undue risk by overlooking cybersecurity implications during the screening and due diligence process of a M&A transaction. A few...

Read more »

Are You Ready for Some IRM? Gartner's 2018 Security & Risk Summit Events Span the Globe

by John Wheeler  |  April 30, 2018

It's that time of year again! Preparations for our upcoming global summit events are at a fever pitch. A central theme for this year's summit is how integrated risk management...

Read more »

My Top 8 Popular Gartner Blog Posts for February 2018

by John Wheeler  |  March 2, 2018

Not to be outdone by my esteemed colleague Dr. Anton Chuvakin, here are my top 8 blog posts read in February 2018: Gartner's New IRM Magic Quadrant Signals End of GRC Era ...

Read more »

New Job Alert: Virtual CISO

by Sam Olyaei  |  February 28, 2018

  Are you an Executive/IT leader/CIO with oversight for security? Do you find yourself resource constrained and reactive? Do you have any idea where your critical data lie? How about...

Read more »

IoT Security | NISTIR 8200 in Draft - Act NOW!

by Erik Heidt  |  February 14, 2018

We knew this was coming, and this is a big day in IoT security and risk management. Let's explore why it is important for your organization to take action now,...

Read more »

3 Resolutions to Turn GRC Failure Into IRM Success

by John Wheeler  |  January 3, 2018

As we begin the new year, many of our clients are searching for ways to turn their failures with Governance, Risk and Compliance (GRC) technology into successful Integrated Risk Management...

Read more »

On Demand | Securing IoT An Architectural and Risk-Driven Approach

by Erik Heidt  |  December 27, 2017

Thanks to everyone who participated the Webinar. "Securing the Internet of Things: An Architectural and Risk-Driven Approach" is now available on-demand, here is the link. Security is a top concern and...

Read more »

Gartner Shares Findings from North Pole Inc. Data and Analytics Assessment

by Doug Laney  |  December 17, 2017

Going into the 2017 holiday season, North Pole Inc. (ticker: XMAS), the leading global distributor of presents to good girls and boys, called upon Gartner to assess and advise on...

Read more »