Gartner Blog Network

Tag: 'threat-detection' Blog Posts

from the Gartner Blog Network

Get the Foundational Elements Right When Selecting a Detection and Response Service Provider

by Pete Shoard  |  April 20, 2020

I recently completed the third update on my Foundational Managed Security Services (MSS) note: Get the Foundational Elements Right When Selecting a Detection and Response Service Provider. This was the...

Read more »

More on “AI for cybersecurity”

by Augusto Barros  |  January 4, 2019

There is a very important point to understand about the vendors using ML for threat detection. Usually ML is used to identify known behavior, but with variable parameters. What does...

Read more »

Endpoint Has Won, Why Bother With NTA?

by Augusto Barros  |  October 3, 2018

One of my favorite blog posts from Anton is the one about the "SOC nuclear triad". As he describes, SOCs should use logs, endpoint and network data on their threat...

Read more »

Comments: 9

The "working with an MSSP" Tome Is Here

by Augusto Barros  |  January 30, 2018

As Anton just posted, the new version of the famous "How to Work With an MSSP to Improve Security" has just been published. I'm very happy to become a co-author...

Read more »

Security Monitoring Use Cases, the UPDATE!

by Augusto Barros  |  January 17, 2018

Posting about updated documents is often boring, but this time I'm talking about my favorite Gartner document, as usual, co-authored with Anton: "How to Develop and Maintain Security Monitoring Use Cases"!...

Read more »

Comments: 5