Quantcast
Channel: Earl Perkins » Security
Browsing all 32 articles
Browse latest View live

Securing Operational Technology and the Internet of Things

Welcome to my first blog post in my new role within the Gartner security analyst team. I am starting a series of posts on two relatively new areas of Gartner security coverage. The first will comment...

View Article



Securing The Internet of Things– Some Not-So-Obvious Concerns

Some of you no doubt noticed that Google announced their intention to buy a company known as Nest Labs for $3.2B U.S., one of their largest acquisitions ever. This blog isn’t about that acquisition,...

View Article

The Internet of Things is Changing the Way We Think of Security in the...

When you read about the Internet of Things (IoT) in the press, it can get very confusing, particularly if you want to consider how one might go about securing the IoT. First, there isn’t universal...

View Article

Getting Past the Word Games to Secure the Internet of Things

One of the things that I enjoy about working at Gartner is the ability to participate with clients and providers in industry, government, commercial, consumer and other sources in more precisely...

View Article

Operational Technology Security – Focus on Securing Industrial Control and...

In a previous blog, I wrote of the terminology that we use when describing security for the Internet of Things, or IoT (“Getting Past the Word Games to Secure the Internet of Things”). In that blog I...

View Article


The “Industrial” Internet of Things and the Industrial Internet Consortium

In my previous blog I took some time to explain the differences between what Gartner has referred to as operational technology (OT) systems and the Internet of Things (IoT). The announcement on March...

View Article

Windows XP Support and Operational Technology Security for Utilities

One significant milestone in operating system history occurred yesterday– the end of official support for Microsoft Windows XP. As with many in the industry, it got me to thinking of the implications...

View Article

When are we going to stop admiring the cybersecurity problems facing smart...

I think after a few years of incessant media coverage on every conceivable way our critical infrastructure can be compromised, many within and outside of operational technology (OT) firms are likely to...

View Article


The Identity of Things for the Internet of Things

It is amusing to see the marketing currently attempted by using an offshoot of the phrase “Internet of Things”. Of course, as an analyst I am no different, so I will propose to you yet another concept...

View Article


Operational Technology Security and the Challenges Ahead for 2015

2014 has been a very active year for cyber attacks and breaches in the industrial automation and control systems areas (what Gartner calls operational technology, or OT). There is no reason to believe...

View Article

Getting Cybersecurity to Work isn’t Going to Work without Doing the Work

I thought it would be appropriate to start off 2015 by adding my voice to a rising chorus from advisors, consultants and others in the cybersecurity industry with a short and simple message. We as an...

View Article

What HAVEN’T We Said About IoT Security So Far?

If you research Internet of Things (IoT) security daily like many in the analyst industry are doing, you keep reading articles that can be characterized as “admiring the problem”. This is serious. This...

View Article

Loss of Safe Harbor creates regulatory fragmentation but EU-US data transfers...

I would like to introduce you to my colleague and friend Carsten Casper, who has been following today’s announcement from the European Union Commission regarding Safe Harbor. He believed this was an...

View Article


What’s Next After the Internet of Things?

A belated Happy New Year to everyone! I am not much for writing of the “Top 5” or “Top 10” Big Things that happened in 2015, so you didn’t hear much from me about last year. While I am a big fan of...

View Article

Existing Security Best-Practice Can Handle IoT Exposures?? Not Really

A recent news article from both a well respected news source and vendor outlined their assurance that IoT security exposures could be taken care of with existing IT-centric security practices as long...

View Article


Webinar Q&A Followup: “Practical Steps to Manage Risk and Security in the...

On July 5, 2016 I gave a Gartner webinar entitled “Practical Steps to Manage Risk and Security in the Internet of Things” (This webinar can be viewed and listened to at...

View Article

Webinar QA 2: Manage Risk & Security in the IoT

As I stated in a recent blog, I completed a Gartner webinar that is now recorded– you can find this recording at http://www.gartner.com/webinar/3337817 if you are interested. At the end of that webinar...

View Article


Threat Fatigue and the Failure of Cybersecurity

There was a recent U.S. National Institute of Standards and Technology (NIST) study titled “Security Fatigue” that was released regarding people’s experiences with online security. Though it had what...

View Article

It’s Time to Move on From “What is the Internet of Things” Discussion If You...

Among Gartner clients we are now beginning to see IoT “definition fatigue” set in as the glitz and excitement surrounding the concept settles into the hard business light of day. The “discovery” of...

View Article

The New Digital Security Organization

Information Technology isn’t what it used to be, is it? At one point we were focused on a relatively fixed set of infrastructure and software- mainframe computers, mid-range computers, servers,...

View Article
Browsing all 32 articles
Browse latest View live




Latest Images