Tag: gartner
-
How CISOs are tackling cyber security challenges
Security chiefs at the recent Gartner Security and Risk Management Summit in Sydney share insights on navigating board communication, organisational resilience and the importance of understanding business needs First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620535/How-CISOs-are-tackling-cyber-security-challenges
-
Managing security in the AI age
Gartner experts offer guidance on harnessing AI’s power while mitigating its risks, from managing shadow AI to implementing security controls and policies First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620437/Managing-security-in-the-AI-age
-
Enterprises: Don’t Delay Move to Post-Quantum Algorithms
Gartner’s Bart Willemsen on Need to Adopt Post-Quantum Cryptography. Nation-state adversaries will likely harvest stolen encrypted data for decryption using quantum decryption, when available. Bart Willemsen, vice president analyst at Gartner, urges enterprises to transition to post-quantum cryptography algorithms to safeguard their data. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/enterprises-dont-delay-move-to-post-quantum-algorithms-a-27646
-
7 key trends defining the cybersecurity market today
Tags: access, ai, attack, cisco, ciso, cloud, compliance, control, crowdstrike, cyber, cybersecurity, data, defense, detection, endpoint, fortinet, gartner, google, governance, group, ibm, intelligence, microsoft, ml, network, okta, resilience, risk, service, siem, startup, strategy, technology, threat, tool, vulnerability, zero-trustMarket leaders are gaining share: The cybersecurity market has a dizzying number of single-product vendors, but a handful of powerful platform providers have risen above the pack and are gaining market share.According to research firm Canalys, the top 12 vendors benefited the most from customers taking early steps to transition to platforms. Collectively, they accounted…
-
Gartner-Umfrage – Datensicherheit und Geschäftsziele vereinen
Tags: gartnerFirst seen on security-insider.de Jump to article: www.security-insider.de/gartner-tipps-datensicherheit-geschaeftsziele-kombination-a-7bde98421b791a27576954ab340008f2/
-
Claroty, Nozomi, Armis Top Cyber-Physical Security Rankings
Gartner MQ for Cyber-Physical Security Details Pros, Cons of Pure-Play Approach. Pure-play OT specialists Claroty, Nozomi and Dragos were joined by asset management expert Armis and behemoth Microsoft atop Gartner’s first-ever ranking of cyber-physical systems vendors. Historically, a wide range of vendors were grouped together under the broad umbrella of OT security. First seen on…
-
What is SIEM? Improving security posture through event log data
Tags: access, ai, api, automation, ciso, cloud, compliance, data, defense, detection, edr, endpoint, firewall, fortinet, gartner, google, guide, ibm, infrastructure, intelligence, kubernetes, LLM, microsoft, mitigation, mobile, monitoring, network, openai, regulation, risk, router, security-incident, service, siem, soar, soc, software, threat, toolAt its core, a SIEM is designed to parse and analyze various log files, including firewalls, servers, routers and so forth. This means that SIEMs can become the central “nerve center” of a security operations center, driving other monitoring functions to resolve the various daily alerts.Added to this data are various threat intelligence feeds that…
-
Customer Identity & Access Management: Die besten CIAM-Tools
Tags: access, ai, api, authentication, business, cloud, compliance, cyberattack, fido, fraud, gartner, iam, ibm, identity, infrastructure, intelligence, login, marketplace, microsoft, okta, privacy, risk, saas, service, toolWir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt.Customer Identity & Access Management (CIAM) bildet eine Unterkategorie von Identity & Access Management (IAM). CIAM wird dazu eingesetzt, die Authentifizierungs- und Autorisierungsprozesse von Applikationen zu managen, die öffentlich zugänglich sind, beziehungsweise von Kunden bedient werden.Geht es darum, die für Ihr…
-
Software Bill of Material umsetzen: Die besten SBOM-Tools
Tags: api, business, compliance, container, cyberattack, data, docker, gartner, github, gitlab, healthcare, linux, monitoring, open-source, risk, saas, sbom, service, software, tool, update, vulnerabilityNur wenn Sie wissen, was drinsteckt, können Sie sich sicher sein, dass alles mit rechten Dingen zugeht. Das gilt für Fast Food wie für Software. Um Software abzusichern, muss man wissen, was in ihrem Code steckt. Aus diesem Grund ist eine Software Bill of Material, SBOM oder Software-Stückliste heute unerlässlich. Der SolarWinds-Angriff sowie die Log4j-Schwachstelle…
-
CISOs struggling to balance security, business objectives
Only 14% of security leaders can ‘effectively secure organisational data assets while also enabling the use of data to achieve business objectives’, according to Gartner First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366619373/Gartner-CISOs-struggling-to-balance-security-business-objectives
-
Die besten IAM-Tools
Tags: access, ai, api, authentication, automation, business, ciso, cloud, compliance, endpoint, gartner, governance, iam, identity, infrastructure, login, mfa, microsoft, okta, password, risk, saas, service, tool, windows, zero-trustIdentity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter und -Tools.Identität wird zum neuen Perimeter: Unternehmen verlassen sich immer seltener auf die traditionelle Perimeter-Verteidigung und forcieren den Umstieg auf Zero-Trust-Umgebungen. Sicherer Zugriff und Identity Management bilden die Grundlage jeder Cybersicherheitsstrategie. Gleichzeitig sorgt die Art und Weise, wie sich…
-
CISOs lavieren zwischen Datenschutz und Business-Support
Gar nicht so einfach, die richtige Balance zwischen Datenschutz und Business-Support zu finden.Die wenigsten Führungskräfte im Bereich Security & Risk Management (SRM) schaffen eine ausgewogene Balance zwischen Datenschutz und Business-Unterstützung. Das hat eine Umfrage von Gartner ergeben. Demzufolge priorisieren 35 Prozent der Befragten den Schutz von Datenbeständen, während gut jeder fünfte (21 Prozent) seinen Fokus…
-
Most Security Leaders Cannot Balance Data Security, Business Goals
The analyst firm recommends defining security and governance processes while reducing friction for business stakeholders. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/gartner-most-security-leaders-cannot-balance-data-security-business-goals
-
Datenleck durch GenAI-Nutzung
Tags: ai, chatgpt, ciso, compliance, data-breach, gartner, LLM, risk, strategy, tool, training, vulnerabilityViele Mitarbeiter teilen sensible Unternehmensdaten, wenn sie generative KI-Apps anwenden.Laut einem aktuellen Bericht über Gen-AI-Datenlecks von Harmonic enthielten 8,5 Prozent der Mitarbeiteranfragen an beliebte LLMs sensible Daten, was zu Sicherheits-, Compliance-, Datenschutz- und rechtlichen Bedenken führte.Der Security-Spezialist hat im vierten Quartal 2024 Zehntausende von Eingabeaufforderungen an ChatGPT, Copilot, Gemini, Claude und Perplexity analysiert. Dabei stellte…
-
The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025
Privileged Access Management (PAM) has emerged as a cornerstone of modern cybersecurity strategies, shifting from a technical necessity to a critical pillar in leadership agendas. With the PAM market projected to reach $42.96 billion by 2037 (according to Research Nester), organizations invest heavily in PAM solutions.Why is PAM climbing the ranks of leadership priorities? While…
-
It pays to know how your cybersecurity stacks up
Like all other business leaders, chief information security officers (CISOs) could find themselves on the unemployment line if something on their watch goes seriously sideways.But what if CISOs simply aren’t demonstrating enough business value?With companies cutting costs, proving cybersecurity programs are good for the business has become vital to protecting budgets and jobs. That’s why…
-
7 tips for improving cybersecurity ROI
Tags: advisory, ai, attack, business, ciso, compliance, control, corporate, cyber, cybersecurity, data, defense, detection, exploit, finance, gartner, group, incident response, infrastructure, intelligence, metric, monitoring, network, privacy, resilience, risk, risk-assessment, risk-management, service, siem, software, strategy, technology, threat, tool, vulnerability, wafWhen it comes to cybersecurity investments, smart money is directed toward initiatives that deliver the greatest protection at the lowest possible cost. But what appears to be a straightforward calculation can often be anything but.CISOs perennially face challenges securing adequate funding to safeguard the enterprise, placing them often in difficult positions attempting to stretch resources…
-
First Proactive Cloud Native Remediation Platform
Automate misconfiguration and vulnerability remediation proactively across on-prem and cloud. Executive Summary Cloud environments have become the backbone of modern organizations, the complexity and volume of misconfigurations and vulnerabilities have emerged as the leading causes of breaches. According to Gartner, cloud misconfigurations account for 65% of cloud breaches. Traditional CNAPPs (Cloud Native Application Protection Platforms)……
-
5 ways boards can improve their cybersecurity governance
Tags: attack, breach, business, ciso, cloud, cyber, cybersecurity, data, election, endpoint, finance, gartner, governance, government, group, identity, incident, india, infrastructure, jobs, middle-east, network, ransomware, regulation, risk, skills, technology, threat, trainingAs chairman of the board for Cinturion Group, Richard Marshall is intimately involved in ensuring the security of the fiber optic network his company is constructing from India through the Middle East and on to Europe.The monumental Trans Europe Asia System (TEAS) will be difficult enough to build given it will be buried beneath thousands…
-
AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability
Gartner forecasts generative AI will be used in 17% of cyberattacks within the next two years. This is not surprising, given that we already see examples of threat actors using AI for their operations. The initial use case involves leveraging AI to simplify access to an environment. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/ai-enhanced-attacks-accelerate-the-need-for-hybrid-multi-cloud-network-security-and-observability/
-
VMware migrations will be long, expensive, risky, Gartner warns
And possibly even more so if you don’t start planning yours soon First seen on theregister.com Jump to article: www.theregister.com/2025/01/21/vmware_migration_gartner_advice/
-
5 Things Government Agencies Need to Know About Zero Trust
Tags: access, application-security, attack, best-practice, business, cloud, control, cyber, cybersecurity, data, gartner, government, identity, incident response, infrastructure, Internet, jobs, monitoring, network, nist, risk, skills, strategy, technology, update, vulnerability, vulnerability-management, zero-trustZero trust as a concept is simple to grasp. Implementing a zero trust architecture, on the other hand, is complex because it involves addressing a unique mix of process, procedure, technology and user education. Here are some considerations to keep in mind as you begin your journey. Draft guidance on implementing a zero trust architecture,…
-
Sysdig in neuem CNAPP-Bericht von Gartner zu ‘Customers’ Choice” gekürt
Sysdig gab heute bekannt, dass Sysdig im Gartner-Peer-Insights-Bericht ‘Voice of the Customer for Cloud-Native Application Protection Platforms ” (CNAPPs) als ‘Customers’ Choice” ausgezeichnet wurde. Dies ist das Ergebnis von mehr als 100 Bewertungen in den letzten 18 Monaten, bei denen Sysdig-Kunden 2024 durchschnittlich 4,9 von 5 möglichen Sternen und eine Weiterempfehlungsrate von 99 Prozent vergaben…
-
NDR braucht Deep Observability
Gartner geht davon aus, dass Network-Detection-and-Response-Lösungen (NDR) in maximal fünf Jahren in der IT-Abteilung zur Standardausstattung gehören werden, da sie einen essenziellen Beitrag zur Sicherheit leisten. Dieser Meinung ist auch Helmut Scheruebel, Senior Sales Engineer von Gigamon. Doch damit sie effizient arbeiten können, darf die Sichtbarkeit nicht zu kurz kommen. Nur mit ausreichend Visibility lässt……
-
Sysdig in neuem CNAPP-Bericht von Gartner zu Customers’ Choice gekürt
Tags: gartnerMit einer perfekten Bewertung von 5 von 5 Punkten in der Kategorie ‘Kundensupport” ist Sysdig das einzige Unternehmen, das sowohl für seine CNAPP als für sein CSPM von Gartner Peer Insights™ die besten Kundenbewertungen erhalten hat First seen on infopoint-security.de Jump to article: www.infopoint-security.de/sysdig-in-neuem-cnapp-bericht-von-gartner-zu-customers-choice-gekuert/a39436/
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
Microsoft, Ping, Okta Dominate Access Management Gartner MQ
Access Management Leaders Remain Unchanged as Customer Identity Cases Proliferate. Advances in customer identity around better user experience, strong authentication, and centralized identity processes have driven rapid growth in the access management market. The space by grew 17.6% to $5.85 billion in 2023 as organizations increasing look to replace homegrown CIAM solutions. First seen on…

