Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

In 2018, What Is Security Architecture?

by Anton Chuvakin  |  August 31, 2018

Summer is a less busy time here in terms of client calls [hey … you can book an analyst call for tomorrow … even with me :-)], so we get...

Read more »

2018 IoT Endpoint Security Assessment Services Survey

by Erik Heidt  |  August 30, 2018

2018 has seen a significant uptick in Gartner clients asking for help identifying security services in support of their IoT efforts. At this time I don't believe there is sufficient demand to make...

Read more »

More on Security Data Lakes - And FAIL!

by Anton Chuvakin  |  August 29, 2018

Naturally, all of you have read my famous “Why Your Security Data Lake Project Will FAIL!” [note: Anton’s ego wrote this line :-)] Today I read a great Gartner note...

Read more »

2 Success Factors Every Top IRM Tech Solution Must Deliver

by John Wheeler  |  June 29, 2018

Have you ever been driving your car down the road when you notice the ride is bumpier than usual? Or perhaps, the car strangely veers to the right or the...

Read more »

10 Years of Cloud Security

by Jay Heiser  |  June 1, 2018

10 years ago this week, Gartner released Assessing the Security Risks of Cloud Computing  Although we had written several research notes in 2007 discussing SaaS security, the 2008 note co-authored...

Read more »

Cybersecurity Is Critical to the M&A Due Diligence Process

by Sam Olyaei  |  May 1, 2018

Another merger, another acquisition, another breach.... Organizations are exposing themselves to undue risk by overlooking cybersecurity implications during the screening and due diligence process of a M&A transaction. A few...

Read more »

Are You Ready for Some IRM? Gartner's 2018 Security & Risk Summit Events Span the Globe

by John Wheeler  |  April 30, 2018

It's that time of year again! Preparations for our upcoming global summit events are at a fever pitch. A central theme for this year's summit is how integrated risk management...

Read more »

My Top 8 Popular Gartner Blog Posts for February 2018

by John Wheeler  |  March 2, 2018

Not to be outdone by my esteemed colleague Dr. Anton Chuvakin, here are my top 8 blog posts read in February 2018: Gartner's New IRM Magic Quadrant Signals End of GRC Era ...

Read more »

New Job Alert: Virtual CISO

by Sam Olyaei  |  February 28, 2018

  Are you an Executive/IT leader/CIO with oversight for security? Do you find yourself resource constrained and reactive? Do you have any idea where your critical data lie? How about...

Read more »

IoT Security | NISTIR 8200 in Draft - Act NOW!

by Erik Heidt  |  February 14, 2018

We knew this was coming, and this is a big day in IoT security and risk management. Let's explore why it is important for your organization to take action now,...

Read more »