Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Our Security Orchestration and Automation (SOAR) Paper Publishes

by Anton Chuvakin  |  February 22, 2018

It is with much excitement that we announce the publication of “Preparing Your Security Operations for Orchestration and Automation Tools”, our epic SOAR paper. Select favorite quotes are: “Test the...

Read more »

IoT Security | NISTIR 8200 in Draft - Act NOW!

by Erik Heidt  |  February 14, 2018

We knew this was coming, and this is a big day in IoT security and risk management. Let's explore why it is important for your organization to take action now,...

Read more »

Back to Basics: Indispensable Security Processes for Detection and Response

by Anton Chuvakin  |  February 8, 2018

For our new research project focused on starting your detection and response effort, we are thinking about an essential bundle of security operations processes needed for such effort. Sort of...

Read more »

3 Resolutions to Turn GRC Failure Into IRM Success

by John Wheeler  |  January 3, 2018

As we begin the new year, many of our clients are searching for ways to turn their failures with Governance, Risk and Compliance (GRC) technology into successful Integrated Risk Management...

Read more »

On Demand | Securing IoT An Architectural and Risk-Driven Approach

by Erik Heidt  |  December 27, 2017

Thanks to everyone who participated the Webinar. "Securing the Internet of Things: An Architectural and Risk-Driven Approach" is now available on-demand, here is the link. Security is a top concern and...

Read more »

Gartner Shares Findings from North Pole Inc. Data and Analytics Assessment

by Doug Laney  |  December 17, 2017

Going into the 2017 holiday season, North Pole Inc. (ticker: XMAS), the leading global distributor of presents to good girls and boys, called upon Gartner to assess and advise on...

Read more »

IoT Endpoint Security Standards Emerging

by Erik Heidt  |  December 13, 2017

Do you need security standards that can be used to evaluate or design IoT Endpoints? Answers are coming! There is an often repeated story arc that security, risk, audit and...

Read more »

The Death of IoT Security As You Know It

by Earl Perkins  |  December 7, 2017

There is a topic that I wanted to share with you that we at Gartner have delivered research on during 2017. We have been developing research on the topic for...

Read more »

IoT Security | Endpoint Hardware Key Storage

by Erik Heidt  |  November 29, 2017

While cryptographic algorithms fail from time to time as computational tools advance or analytical breakthroughs occur, failures of this nature are rare events. Key storage or management failures are the leading...

Read more »

Our Intelligence Lead Defenses Must Evolve

by Lawrence Pingree  |  November 15, 2017

  Threat intelligence has been a hot topic during the past few years. Back in 2015, I introduced research titled "Intelligent and Automated Security Controls Impact the Future of the Security...

Read more »