:-)

From my Gartner Blog – Threat Simulation Open Source Projects

It’s crazy how many (free!) OSS projects are popping up for threat and attack simulation! We are working on research about Breach and Attack Simulation (BAS) tools, and we’ll certainly mention these projects, buy I thought it would be valuable to provide a list of links on the blog as ... Read More
From my Gartner Blog - Big data And AI Craziness Is Ruining Security Innovation

From my Gartner Blog – Big data And AI Craziness Is Ruining Security Innovation

I don’t care if you use Hadoop or grep+Perl scripts. If you can demonstrate enough performance to do what you claim you can do, that’s what matters to me from a backend point of view. Now, can you show me that your tool does what it should do better than ... Read More
mitigation-analyst

From my Gartner Blog – The Virtual Patch Analyst

Is there a need, or place for a “virtual patch analyst”?If you look at our guidance on vulnerability management, you’ll see that one of the key components we suggest our clients to consider is preparing for mitigation actions, when the immediate vulnerability remediation is not possible. We often see organizations ... Read More
From my Gartner Blog - It’s Not (Only) That The Basics Are Hard…

From my Gartner Blog – It’s Not (Only) That The Basics Are Hard…

While working on our research for testing security practices, and also about BAS tools, I’ve noticed that a common question about adding more testing is “why not putting some real effort in doing the basics instead of yet another security test?”. After all, there is no point in looking for ... Read More
:-)

From my Gartner Blog – SOAR paper is out!

Anton beat me this time on blogging about our new research, but I’ll do it anyway Our document about Security Orchestration, Automation and Response (SOAR) tools includes some interesting findings. Anton provided some quotes on his post, but I’ll mention some of my favorites too:SIEM tools are often used to ... Read More
pentest-killed

From my Gartner Blog – BAS and Red Teams Will Kill The Pentest

With our research on testing security methods and Breach and Attack Simulation tools (BAS), we ended up with an interesting discussion about the role of the pentest. I think we can risk saying that pentesting, as it is today, will cease to exist (I’ll avoid the trap to say “pentesting ... Read More
343485_0001

From my Gartner Blog – The “working with an MSSP” Tome Is Here

As Anton just posted, the new version of the famous “How to Work With an MSSP to Improve Security” has just been published. I’m very happy to become a co-author (together with Anton and Mike Wonham) on this document, as it is usually one of our documents that I most ... Read More
Enlarge Image

From my Gartner Blog – Security Monitoring Use Cases, the UPDATE!

Posting about updated documents is often boring, but this time I’m talking about my favorite Gartner document, as usual, co-authored with Anton: “How to Develop and Maintain Security Monitoring Use Cases”!This document described an approach to identity, prioritize, implement and manage security monitoring use cases. Of course, it has a ... Read More
From my Gartner Blog - Automation – Why Only Now?

From my Gartner Blog – Automation – Why Only Now?

As we ramp up our research on SOAR and start looking at some interesting tools for automated security testing, something crossed my mind: Why are we only seeing security operations automation and security testing automation technologies come to market now? I mean, automating workflows is not new technology, so why ... Read More
From my Gartner Blog - Threat Simulation – How real does it have to be?

From my Gartner Blog – Threat Simulation – How real does it have to be?

We are starting our research on “Testing Security”. So far we’ve been working with a fairly broad scope, as Anton’s post on the topic explained. One of the things we are looking at is the group of tools that has been called “breach and attack simulation tools”.Tools that automate exploitation ... Read More
Loading...