Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

How To Test Your MSSP/MDR?

by Anton Chuvakin  |  October 11, 2017

As customary in our beloved domain of “cyber”, I will start with a depressing quote: “If you really knew how to test an MSSP properly, you likely didn't need an...

Read more »

SOAR: Magic or Mundane?

by Anton Chuvakin  |  October 6, 2017

When we think of Security Orchestration, Automation and Response (SOAR) nowadays (and we do think a lot about SOAR), we primarily think of this: SOAR = security workflow + security...

Read more »

You Can't Outrun the Security Bear

by Jay Heiser  |  October 5, 2017

The September 7 Equifax hack is a hugely emotional and hyped event that continues to generate congressional and media attention.  If there is any good news, its likely that the...

Read more »

2018 Planning Guide for Security and Risk Management

by Anton Chuvakin  |  October 4, 2017

Our team has just released our annual security planning guide: “2018 Planning Guide for Security and Risk Management.” Every Gartner GTP customer should go and read it (in fact, the...

Read more »

My Top 7 Popular Gartner Blog Posts for September 2017

by Anton Chuvakin  |  October 2, 2017

Most popular blog posts from my Gartner blog during the past month are: SIEM Use Cases – And Other Security Monitoring Use Cases Too! (security monitoring research) Security Analytics: Platform...

Read more »

Equifax Data Breach: It's the End of Cybersecurity as We Know It

by John Wheeler  |  September 14, 2017

As most everyone knows by now, one of the single largest data breaches in history was disclosed last week by the credit reporting giant, Equifax. While most people are rightly...

Read more »

2 x Life Science Hype Cycles

by Michael Shanler  |  July 29, 2017

While the spring rains drenched the northeastern U.S. and parts of Europe, Jeff, Steve, and I were hard at work authoring, arranging, writing, reviewing,  re-reviewing, re-re-reviewing our content.  After countless...

Read more »

The Middle East cannot continue to throw money at Cybersecurity!

by Sam Olyaei  |  July 25, 2017

The Middle East is at a crossroads in cybersecurity practices. Home to more than half of the world's natural gas and oil reserves, coupled with future megaevents such as Expo...

Read more »

A CIO’s 24 Hours of Le Mans

by Michael Shanler  |  June 28, 2017

CIOs are competing in an endurance race.  Winning requires carefully orchestrated activities that rely on technology, team work, precision driving, and a bit of luck.   As in racing, the victorious...

Read more »

2018 is the year of enterprise-ready counterintelligence.

by Lawrence Pingree  |  June 17, 2017

Imagine for a moment, a future where enterprises get to remotely control the actions of the threat actor. A future where you will be able to engage products or services...

Read more »