Gartner Blog Network

Tag: 'information-security' Blog Posts

from the Gartner Blog Network

What Is In Your GRC "Junk Drawer"?

by John Wheeler  |  March 3, 2015

Everyone has one. Somewhere in their kitchen or garage is the infamous "junk drawer". Over time, the drawer fills up with gadgets, tools, scraps of paper with to do lists...

Read more »

Five Tips for Companies Considering Cyber Insurance

by John Wheeler  |  March 2, 2015

As cyber attacks and data breaches are surfacing on a daily basis, our clients are looking for ways to mitigate the risk associated with these events. One of the most...

Read more »

Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company

by John Wheeler  |  October 6, 2014

In the news today, social media risks for individuals are certainly grabbing the headlines. Celebrity hacking, child exploitation, identity theft and fraud, just to name a few. However, the risks...

Read more »

Women in Information Security and Risk Management Have A Lot To Say About The Profession and Their Role In It

by Roberta Witty  |  July 8, 2014

At the 2014 Gartner Security and Risk Management Summit at National Harbor, MD, an inaugural session on women in Information Security and Risk Management was conducted. We thought it would...

Read more »

The Rising Prominence of Risk Management

by John Wheeler  |  March 21, 2014

With all the current hype around big data and analytics, I recently decided to explore how risk management has grown in popularity using a unique big data analytic tool - Google's...

Read more »

Incident Response: The Death of a Straight Line

by Anton Chuvakin  |  June 5, 2013

As I am diving deeper into modern security incident response (IR) practices, one shocking realization reigns supreme: the arrow is dead.  Well, let me take this back: as we all...

Read more »

Is Antivirus Obsolete?

by Neil Macdonald  |  September 13, 2012

I blogged about this question years ago, but a recent blog on CSO got me thinking once again. Has anything changed? Thoughts: 1) The question “Has antivirus outlived its value?”...

Read more »

Cloud Computing can be More Secure

by Neil Macdonald  |  March 31, 2012

In multiple Gartner surveys, security is cited as the number one inhibitor to the adoption of Cloud-based computing. Many IT professionals have a preconceived notion that cloud computing will be...

Read more »

Blunderfunding: How Organizations Use Failure as a Basis for Budgeting

by Doug Laney  |  January 17, 2012

A major Wall Street securities ratings firm ignores the recommendations of a consultant report it paid for on rating collateralized debt obligations (CDOs)--contributing to the collapse of the mortgage industry,...

Read more »