Tag: gartner
-
ITJobs 5 bittere Wahrheiten
Tags: breach, business, cio, cisco, ciso, cybersecurity, cyersecurity, gartner, germany, jobs, network, risk, risk-management, strategy, trainingViel Geld schützt nicht vor Burnout.Die Nachfrage nach Cybersecurity-Spezialisten ist ähnlich hoch wie deren Gehälter. Laut einem aktuellen, US-zentrischen Benchmark Report von IANS und Artico Search liegt das durchschnittliche Grundgehalt für Führungsrollen im Bereich IT-Security in Nordamerika bei mehr als 150.000 Dollar jährlich. Und auch wenn die Vergütung in Europa und Deutschland generell etwas geringer…
-
ITJobs 5 bittere Wahrheiten
Tags: breach, business, cio, cisco, ciso, cybersecurity, cyersecurity, gartner, germany, jobs, network, risk, risk-management, strategy, trainingViel Geld schützt nicht vor Burnout.Die Nachfrage nach Cybersecurity-Spezialisten ist ähnlich hoch wie deren Gehälter. Laut einem aktuellen, US-zentrischen Benchmark Report von IANS und Artico Search liegt das durchschnittliche Grundgehalt für Führungsrollen im Bereich IT-Security in Nordamerika bei mehr als 150.000 Dollar jährlich. Und auch wenn die Vergütung in Europa und Deutschland generell etwas geringer…
-
5 hard truths of a career in cybersecurity, and how to navigate them
Tags: access, ai, application-security, attack, awareness, best-practice, breach, business, cio, ciso, conference, control, cyber, cybersecurity, data-breach, finance, firewall, framework, gartner, identity, ISO-27001, jobs, mitigation, network, regulation, risk, risk-assessment, risk-management, skills, strategy, technology, threat, training, wafCybersecurity teams protect systems but neglect people: After all the effort it takes to break into cybersecurity, professionals often end up on teams that don’t feel welcoming or supportive.Jinan Budge, a research director at Forrester who focuses on enabling CISOs and other technical leaders, believes the way most cybersecurity career paths are structured plays a…
-
Interview mit Gartner Digitale Souveränität ist nahezu unmöglich
Tags: gartnerFirst seen on security-insider.de Jump to article: www.security-insider.de/gartner-interview-digitale-souveraenitaet-a-40019afe5e98cd8b1c2408c318c5e2bb/
-
How the CyberArk Deal Is Different From Past Palo Alto M&A
Gartner’s Charlie Winckless on Why Palo Alto Is Breaking With Past M&A Tradition. Palo Alto Networks aims to acquire CyberArk for $25 billion, marking a major shift from its startup-focused M&A approach. Gartner VP Analyst Charlie Winckless says the deal highlights how AI and machine identity are reshaping what platform security vendors need to deliver.…
-
How CISOs can scale down without compromising security
Tags: breach, business, ciso, compliance, control, cybersecurity, data, detection, finance, framework, gartner, governance, intelligence, jobs, metric, open-source, regulation, resilience, risk, soc, strategy, threat, tool, training, vulnerabilityStrategic risk (high, medium, low): What’s the actual exposure if this control fails?Business alignment: Which functions are enabling revenue, customer trust, or compliance?No-brainers: These are redundant tools, shelfware, or “security theatre” controls that look good on paper but deliver no measurable protection.For this assessment, Mahdi brings together a cross-functional team that includes business unit leaders,…
-
Global cyber spend will top $200bn this year, says Gartner
Worldwide spending on cyber security will hit another record high in 2025, and will go higher still next year First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628165/Global-cyber-spend-will-top-200bn-this-year-says-Gartner
-
Cybersicherheitsausgaben wachsen langsamer
Die Ausgaben steigen weltweit, in Deutschland aber mit leichter Delle. PeopleImages.com Yuri AViele Unternehmen haben bereits realisiert, wie wichtig Investitionen in Cybersicherheit sind und erhöhen dementsprechend ihre Ausgaben soweit es das Budget zulässt.Diese Entwicklung spiegelt sich auch im neuen Forcast von Gartner wider. Wie das Analystenhaus in seinem aktuellen Bericht ‘Forecast: Information Security, Worldwide, 2023-2029,…
-
HYCU erneut als Visionär im Gartner Magic Quadrant for Backup and Data Protection Platforms positioniert
Die Auszeichnung als Visionär spiegelt nicht nur Innovation wider, sondern symbolisiert auch die Ausrichtung auf die dringenden Anforderungen der IT-Führungskräfte von heute First seen on infopoint-security.de Jump to article: www.infopoint-security.de/hycu-erneut-als-visionaer-im-gartner-magic-quadrant-for-backup-and-data-protection-platforms-positioniert/a41521/
-
Fortinet Joins SASE ‘Leaders’ Palo Alto Networks, Netskope, Cato: Gartner Magic Quadrant
Fortinet ascended into the ‘leaders’ category for Gartner’s 2025 Magic Quadrant for SASE Platforms, joining Palo Alto Networks, Netskope and Cato Networks in the report’s sought-after top ranking. First seen on crn.com Jump to article: www.crn.com/news/security/2025/fortinet-joins-sase-leaders-palo-alto-networks-netskope-cato-gartner-magic-quadrant
-
MCP is fueling agentic AI, and introducing new security risks
Tags: access, ai, api, attack, authentication, best-practice, ceo, cloud, corporate, cybersecurity, gartner, injection, LLM, malicious, monitoring, network, office, open-source, penetration-testing, RedTeam, risk, service, supply-chain, technology, threat, tool, vulnerabilityMitigating MCP server risks: When it comes to using MCP servers there’s a big difference between developers using it for personal productivity and enterprises putting them into production use cases.Derek Ashmore, application transformation principal at Asperitas Consulting, suggests that corporate customers don’t rush on MCP adoption until the technology is safer and more of the…
-
The trust crisis in the cloud”¦and why blockchain deserves a seat at the table
Tags: access, blockchain, breach, cloud, compliance, control, credentials, crypto, data, data-breach, framework, gartner, iam, identity, infrastructure, jobs, risk, threat, tool, zero-trustLimited visibility and tamperable logs. Cloud providers manage logs and telemetry internally. As tenants, we often depend on them to provide logs after an incident without a guarantee of tamper-proof integrity. This lack of transparency hampers forensic investigations and incident response.Privilege concentration and insider risk. CSP administrators often hold elevated access privileges, making them single…
-
The trust crisis in the cloud”¦and why blockchain deserves a seat at the table
Tags: access, blockchain, breach, cloud, compliance, control, credentials, crypto, data, data-breach, framework, gartner, iam, identity, infrastructure, jobs, risk, threat, tool, zero-trustLimited visibility and tamperable logs. Cloud providers manage logs and telemetry internally. As tenants, we often depend on them to provide logs after an incident without a guarantee of tamper-proof integrity. This lack of transparency hampers forensic investigations and incident response.Privilege concentration and insider risk. CSP administrators often hold elevated access privileges, making them single…
-
Editors’ Panel: Pro-Iran Hackers Threaten to Leak Trump Data
Also: Medicare Data Breach; Gartner Security & Risk Management Summit Takeaways. In this week’s update, ISMG editors discussed Iran-linked hackers claiming to steal emails from Trump’s inner circle, how to refine application development in the age of AI, and a U.S. Medicare data breach amplifying concerns over the safety, security and privacy of federal health…
-
Psychological Contract Breach and the Power of Security Culture Research Insights
Employees are expected to behave securely, and the definition of “securely” is often written down in a myriad of security policies. Yet, people do not always comply with security policies or make use of available tools. Gartner documents in their research that 69% of all employees intentionally bypass cybersecurity guidance, and 93% behave consciously and…
-
How cybersecurity leaders can defend against the spur of AI-driven NHI
Tags: access, ai, attack, automation, breach, business, ciso, cloud, credentials, cybersecurity, data, data-breach, email, exploit, framework, gartner, governance, group, guide, identity, infrastructure, least-privilege, LLM, login, monitoring, password, phishing, RedTeam, risk, sans, service, software, technology, tool, vulnerabilityVisibility Yageo Group had so many problematic machine identities that information security operations manager Terrick Taylor says he is almost embarrassed to say this, even though the group has now automated the monitoring of both human and non-human identities and has a process for managing identity lifecycles. “Last time I looked at the portal, there…
-
How exposure-enriched SOC data can cut cyberattacks in half by 2028
Gartner projects that by 2028, organizations enriching their Security Operations Center (SOC) data with exposure insights will reduce the frequency and impact of cyberattacks … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/30/plextrac-data-exposure-management/
-
Aktuelle Marktanalyse von Gartner – Digitale Souveränität wird strategisch
Tags: gartnerFirst seen on security-insider.de Jump to article: www.security-insider.de/digitale-soveraenitaet-chancen-herausforderungen-loesungen-a-50fb482eb31a9ad270ce146cf21b0ffb/
-
Teradata stellt die AI Factory für private On-Premise KI-Innovation in Unternehmen vor
Ein aktueller Bericht des Analystenhauses Gartner unterstreicht diesen Trend: ‘Bis 2028 werden mehr als 20 % aller Unternehmen KI-Workloads sei es Training oder Inferenz lokal in ihren Rechenzentren betreiben. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/teradata-stellt-die-ai-factory-fuer-private-on-premise-ki-innovation-in-unternehmen-vor/a41259/
-
Skyhawk Security mentioned in the 2025 Gartner Emerging Tech: Techscape for Detection and Response Startups
First seen on scworld.com Jump to article: www.scworld.com/native/skyhawk-security-mentioned-in-the-2025-gartner-emerging-tech-techscape-for-detection-and-response-startups
-
Flowable Named in the latest Gartner® Market Guide for BPA Tools
ZURICH, Switzerland Zurich-based automation platform Flowable has been recognized as a Representative Vendor in the Gartner newly released… First seen on hackread.com Jump to article: hackread.com/flowable-named-latest-gartner-market-guide-bpa-tools/
-
AI or Data Governance? Gartner Says You Need Both
Gartner Says Leaders Should Balance AI Innovation With Strong Data Governance. As AI adoption grows, Gartner warns that data governance, not technology, is the top hurdle. At the Mumbai summit, Gartner analysts said data and analytics leaders should shift from fear to trust, align with business goals and scale AI through practical governance. First seen…
-
Deutsche fordern Transparenz und Kontrolle bei KI-Agenten
Okta hat seinen jährlichen ‘Customer Identity Trends Report” veröffentlicht. Dieser enthüllt eine entscheidende Erkenntnis für Unternehmen, die KI-Agenten einsetzen: Vertrauen und Kontrolle sind für eine erfolgreiche Akzeptanz von entscheidender Bedeutung, insbesondere bei deutschen Verbrauchern. Trotz der zunehmenden Verbreitung von KI-Agenten in der EMEA-Region laut Gartner werden bis 2028 ein Drittel aller Interaktionen mit generativer […]…
-
NSFOCUS was Selected as a Representative Provider of Gartner® “Innovation Insight: Adversarial Exposure Validation in China”
SANTA CLARA, Calif., June 24, 2025 Recently, Gartner released the 2025 “Innovation Insight: Adversarial Exposure Validation in China”¹, NSFOCUS was selected as a Representative Provider for its adversarial exposure validation (AEV) capability in the continuous threat exposure management (CTEM) service. Why has ASM become a pain point for enterprises? Asset data is scattered and lacks…The…
-
A New Identity Playbook for AI Agents: Securing the Agentic User Flow
Artificial intelligence has reached an inflection point. AI agents are no longer just service accounts or background processes. They’re decision-makers, workflow executors, and digital delegates”, acting autonomously across APIs, clouds, and systems. Unlike traditional non-human identities (NHI), like service accounts or static API keys, agentic identities are dynamic, ephemeral, and often self-directed. Gartner highlights that…
-
The Identity Gaps in Agentic AI: 9 Problems We Must Solve to Secure the Future
AI agents have evolved from passive tools into proactive actors”, making decisions, executing transactions, and interacting with APIs autonomously. Unlike traditional non-human identities (NHI) that serve narrow, static purposes, agentic identities are dynamic, ephemeral, and often independent in their actions. By 2026, Gartner predicts that 30% of enterprises will rely on AI agents that operate…

