Information Security

Covering innovative technologies and trends that characterize the ever-changing nature of the security landscape, within the contexts of risk management and business processes.


The Information Security Channel covers technologies that organizations deploy to protect themselves against an ever-increasing array of threats, with emphasis on areas including advanced threat defense, endpoint protection, cloud security, security analytics and intelligence, data protection and emerging trends in identity and access management. Aimed at senior security practitioners as well as vendors and investors, the Information Security Channel examines technical issues within the contexts of risk management and business processes. Our research reports run the gamut of critical security topics, from profiles of companies just out of stealth to exploring how security products end up as shelfware.


Contributing Analysts

Learn more about our Information Security research

Recent Reports in Information Security
Information Security
Technology & Business Insight

Beyond the Perimeter - From ‘Zero Trust’ to ‘Unified Access Control’

As the heir apparent to traditional perimeter-based security architectures, zero-trust networking has the potential to fundamentally change the way security is done in the coming years – though it won’t be easy, and there is a lot of work to be done.

Information Security
Report Excerpt

2019 Trends in Information Security

The rise of Invisible Infrastructure continues to redefine security implementation, from DevOps and cloud to security’s own embrace of automation. Third-party exposures raise concerns and ‘zero trust’ comes to the fore, while the opportunity for security services is greater than ever.

Information Security
Technology & Business Insight

The Evolving Role of the Cloud Provider in Securing IoT

As security is increasingly viewed as a critical factor in determining both whether IoT projects are approved and where workloads are executed, cloud providers are incentivized to facilitate secure IoT ecosystems. This report examines the role cloud providers have begun to play in securing IoT environments and describes how that role may continue to evolve as the IoT market matures.

Information Security
Market Insight

Industrial Internet Consortium releases ICS endpoint security best practices guidance

The Industrial Internet Consortium (IIC) has followed up on its 2016 Industrial Internet Security Framework (IISF) with a more detailed document outlining best practices for ICS and SCADA endpoint security

Information Security
Market Insight

Security automation and orchestration brings sanity to incident response chaos

Security automation and orchestration (SAO) serves a niche market of large enterprises and MSSPs with finite SOC resources attempting to keep up with extreme levels of security alerts.