What Does Gartner, Inc. Think about Cyber Security, and Why Should It Matter To You?

What Does Gartner, Inc. Think about Cyber Security, and Why Should It Matter To You?

Gideon Gartner, a former financial analyst of the Gartner, Inc. revealed its “Top Security Predictions 2016”

Want create site? Find Free WordPress Themes and plugins.

Published by Lawrence D. Dietz

Gartner, Inc.Gideon Gartner a former financial analyst with Oppenheimer founded the Gartner, Inc. in the late 1970s. The company was born out of the fact that Gartner had an uncanny ability to predict what IBM would be doing in their next announcement.

Since then Gartner has been a ‘go to’ source for IT shops seeking to hedge their bets on what IT products or services they should buy. Recognizing the market opportunity behind this need for vendor rankings, Gartner developed its famous Magic Quadrant, Hype Cycle and predictions.

Unlike market forecasts which often have no real basis in reality or data, Gartner analysts talk to a lot of IT buyers and sellers. Earlier this month Gartner, Inc. released its “Top 10 Security Predictions – 2016”.

As a recovering analyst I’m typically not inclined to believe the percentages assigned to the ten of them, however, there is some useful intelligence to be gleaned from the list. So TAL Global has taken the Gartner, Inc. list a step further by providing practical analysis on how these items relate to you (source: Gartner Inc.):

  1. Attackers will take advantage of known vulnerabilities.
    Organizations need to regularly assess their vulnerabilities and patch them religiously.
  2. Unknown IT means trouble.
    You must be vigilant in determining what devices are accessing corporate information resources. This also means that you need to formalize your Bring Your Own Device (BYOD) policies and procedures.
  3. Public Clouds are a swamp
    Using a public cloud is a swamp. There are dangerous animals out there and you need to take appropriate precautions. Policies and procedures are key as are monitoring and enforcement.
  4. Applications need to be designed with security built in.
    The nature of development operations must change so that security is a key element of the architecture of new applications, not cobbled on to them after they are built.
  5. Privacy concerns may give way to practicalities.
    Notwithstanding user privacy concerns, biometric recognition technology will gradually replace cumbersome passwords and tokens.
  6. IoT is the next SCADA
    Just as Supervisory Control and Data Acquisition Devices (SCADA) systems were never designed with security as a concern, neither are today’s IoT systems. The growth of the unsecured systems will be a giant vulnerability for adversaries to exploit.

TAL Global will work with you to apply this intelligence to your own situation and to help you to minimize the risks these potential trends could mean to you and your organization.

Did you find apk for android? You can find new Free Android Games and apps.

Please share us with others:

TAL Global: Safety and Security Webinar Series

Travel Security Webinar (Free)

Please join us for a free webinar covering information to help you stay safe and secure during domestic or international travel.

With more organizations operating internationally, there is a greater need for staff to travel overseas. This brings with it a series of risks to the traveler and the organization if things go wrong.

Based on years of experience supporting individuals and organizations around the world, TAL Global will provide advice and guidance on how to minimize the risks faced while traveling internationally.

The presentation will cover:

  • ● Pre Trip Preparations
  • ● Safety and Security While En-Route
  • ● On Location: “When in Rome do as the Romans”:
    • ○ If Worse Comes to Worse
  • ● Local Transportation Security
  • ● A Word About Digital Security
  • ● Real Life Case Studies
    • ○ Egypt
    • ○ Turkey


Date: December 6, 2017

Time: 10:00 AM PST / 1:00 PM EST

Duration: 30 minutes

Presenter: Mr. Johnathan Tal

Read more about Johnathan Tal