array(3) { ["company_details"]=> array(13) { ["name"]=> string(13) "Gartner, Inc." ["slug"]=> string(20) "694c2-us-gartner-inc" ["logo"]=> string(84) "https://images.businessradar.com/linkedin_logos/830960d8-449e-497f-8e05-f9364ea4b886" ["description"]=> string(728) "Gartner is a company that delivers actionable, objective insight to executives and their teams. They provide expert guidance and tools to enable faster, smarter decisions and stronger performance on an organization's mission-critical priorities. Gartner has been providing insights and expert guidance to clients' enterprises worldwide for over 40 years. They work with businesses in nearly 90 countries and have over 19,500 associates in approximately 85 offices globally. Gartner offers research and advisory services, conferences, consulting, and more. They also have a commitment to diversity, equity, and inclusion. Gartner's website provides more information about their services, leadership, and corporate responsibility." ["address_street"]=> string(17) "56 Top Gallant Rd" ["address_place"]=> string(8) "Stamford" ["address_region"]=> string(11) "Connecticut" ["founding_date"]=> string(10) "1979-02-28" ["website_domain"]=> string(11) "gartner.com" ["website_url"]=> string(23) "https://www.gartner.com" ["industry_codes"]=> array(3) { [0]=> string(59) "Commercial Economic, Sociological, and Educational Research" [1]=> string(19) "Management Services" [2]=> string(30) "Management Consulting Services" } ["employee_count"]=> int(1314) ["article_count"]=> int(3458) } ["articles"]=> array(9) { [0]=> array(7) { ["title_en"]=> string(50) "13 best data protection software platforms of 2024" ["snippet_en"]=> string(149) "To keep up with data privacy laws, sophisticated cyberattacks and generative AI's infiltration, learn about this year's top data protection software." ["url"]=> string(91) "https://www.techtarget.com/searchdatabackup/feature/Best-data-protection-software-platforms" ["image_url"]=> string(78) "https://images.businessradar.com/articles/4a30197c-5e99-4ccc-a605-5db65d8de4d6" ["source"]=> string(14) "techtarget.com" ["publication_date"]=> string(10) "2024-04-15" ["categories"]=> array(3) { [0]=> string(13) "Data Security" [1]=> string(16) "Customer Privacy" [2]=> string(10) "Cybercrime" } } [1]=> array(7) { ["title_en"]=> string(131) "Elon Musk's AI chatbot Grok has the weakest security, while Meta's Llama is strong: researchers - Decrypt - Plato Data Intelligence" ["snippet_en"]=> string(146) "Security researchers placed much-hyped guardrails around the most popular AI models to see how resistant they were to jailbreaking, and tested how" ["url"]=> string(145) "https://zephyrnet.com/it/elon-musks-grok-ai-chatbot-ha-la-sicurezza-pi%C3%B9-debole-mentre-metas-llama-%C3%A8-forte-e-i-ricercatori-lo-decifrano/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/328fff85-4877-41c2-9a80-315db8912646" ["source"]=> string(13) "zephyrnet.com" ["publication_date"]=> string(10) "2024-04-07" ["categories"]=> array(3) { [0]=> string(13) "Data Security" [1]=> string(16) "Customer Privacy" [2]=> string(10) "Cybercrime" } } [2]=> array(7) { ["title_en"]=> string(39) "Data Quality Getting Worse, Report Says" ["snippet_en"]=> string(154) "For as long as “big data” has been a thing, data quality has been a big question mark. Working with data to make it suitable for analysis was the task" ["url"]=> string(75) "https://www.datanami.com/2024/04/05/data-quality-getting-worse-report-says/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/98c9aa76-4ea1-4bde-ba3e-8b920dd88f53" ["source"]=> string(12) "datanami.com" ["publication_date"]=> string(10) "2024-04-05" ["categories"]=> array(3) { [0]=> string(13) "Data Security" [1]=> string(16) "Customer Privacy" [2]=> string(10) "Cybercrime" } } [3]=> array(7) { ["title_en"]=> string(88) "MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era" ["snippet_en"]=> string(238) "It’s a digital swindle as old as the internet itself, and yet, as the data tells us, the vast majority of security incidents are still rooted in the low-tech art of social engineering. Related: AI makes scam email look real... (more...)" ["url"]=> string(125) "https://securityboulevard.com/2024/04/my-take-why-email-security-desperately-needs-retooling-in-this-post-covid-19-genai-era/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/41d91b19-e445-4f62-92f3-28998c896458" ["source"]=> string(21) "securityboulevard.com" ["publication_date"]=> string(10) "2024-04-02" ["categories"]=> array(2) { [0]=> string(13) "Data Security" [1]=> string(10) "Cybercrime" } } [4]=> array(7) { ["title_en"]=> string(53) "Cybersecurity Mesh: Overcoming Data Security Overload" ["snippet_en"]=> string(110) "What to consider when assessing vendors that promise to unlock the power of a cybersecurity mesh architecture." ["url"]=> string(82) "https://www.securityweek.com/cybersecurity-mesh-overcoming-data-security-overload/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/09364283-4df8-4d3a-afec-5579b0a9d48e" ["source"]=> string(16) "securityweek.com" ["publication_date"]=> string(10) "2024-03-28" ["categories"]=> array(4) { [0]=> string(24) "Systemic Risk Management" [1]=> string(13) "Data Security" [2]=> string(18) "General Investment" [3]=> string(10) "Cybercrime" } } [5]=> array(7) { ["title_en"]=> string(60) "Regulations set to cyber-secure the supply chain - Techerati" ["snippet_en"]=> string(139) "By 2025, 45% of organisations may face supply chain attacks. Prioritising supply chain security beyond regulations is vital for resilience." ["url"]=> string(88) "https://www.techerati.com/features-hub/regulations-set-to-cyber-secure-the-supply-chain/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/9e45e5f2-0c99-48b1-a8dd-43c29ecb20b9" ["source"]=> string(13) "techerati.com" ["publication_date"]=> string(10) "2024-03-27" ["categories"]=> array(6) { [0]=> string(11) "Regulations" [1]=> string(23) "Supply Chain Management" [2]=> string(10) "Cybercrime" [3]=> string(27) "Supply Chains Vulnerability" [4]=> string(23) "Supply Chain Disruption" [5]=> string(13) "Data Security" } } [6]=> array(7) { ["title_en"]=> string(77) "Nametag, Indian academics, Intercede strengthen MFA with biometrics, passkeys" ["snippet_en"]=> string(142) "As deepfake threats rise, enterprises are losing faith in the security of identity verification and authentication without further protection." ["url"]=> string(113) "https://www.biometricupdate.com/202403/nametag-indian-academics-intercede-strengthen-mfa-with-biometrics-passkeys" ["image_url"]=> string(78) "https://images.businessradar.com/articles/f5c7da72-1a76-416a-8624-34200b36edfc" ["source"]=> string(19) "biometricupdate.com" ["publication_date"]=> string(10) "2024-03-26" ["categories"]=> array(2) { [0]=> string(13) "Data Security" [1]=> string(10) "Cybercrime" } } [7]=> array(7) { ["title_en"]=> string(51) "Cybersecurity Trends: Top 10 ETFs For Cyber Defense" ["snippet_en"]=> string(294) "In this article, we discuss 10 ETFs for cyber defense. If you want to skip our discussion on the cybersecurity industry, head over to Cybersecurity Trends: Top 5 ETFs For Cyber Defense. In 2024, Gartner predicts several significant cybersecurity trends driven by Generative AI( GenAI), unsecure" ["url"]=> string(78) "https://finance.yahoo.com/news/cybersecurity-trends-top-10-etfs-130533530.html" ["image_url"]=> string(78) "https://images.businessradar.com/articles/413b6ebf-ebbe-4c05-b347-badd8321dff9" ["source"]=> string(9) "yahoo.com" ["publication_date"]=> string(10) "2024-03-22" ["categories"]=> array(1) { [0]=> string(10) "Cybercrime" } } [8]=> array(7) { ["title_en"]=> string(57) "The 18 most important data catalog tools and technologies" ["snippet_en"]=> string(139) "There are numerous tools for creating and managing data catalogs. In this article you will find the 18 most popular data catalog platforms." ["url"]=> string(93) "https://www.computerweekly.com/de/tipp/Die-18-wichtigsten-Datenkatalog-Tools-und-Technologien" ["image_url"]=> string(78) "https://images.businessradar.com/articles/d6312afd-facc-433e-a6c2-33316b321b57" ["source"]=> string(18) "computerweekly.com" ["publication_date"]=> string(10) "2024-03-22" ["categories"]=> array(3) { [0]=> string(13) "Data Security" [1]=> string(16) "Customer Privacy" [2]=> string(10) "Cybercrime" } } } ["category_annotations"]=> array(30) { [0]=> array(2) { ["name"]=> string(13) "Data Security" ["count"]=> int(411) } [1]=> array(2) { ["name"]=> string(10) "Cybercrime" ["count"]=> int(198) } [2]=> array(2) { ["name"]=> string(16) "Customer Privacy" ["count"]=> int(138) } [3]=> array(2) { ["name"]=> string(5) "R & D" ["count"]=> int(137) } [4]=> array(2) { ["name"]=> string(41) "E-commerce and Technological Developments" ["count"]=> int(135) } [5]=> array(2) { ["name"]=> string(23) "Supply Chain Management" ["count"]=> int(133) } [6]=> array(2) { ["name"]=> string(25) "Business Model Resilience" ["count"]=> int(97) } [7]=> array(2) { ["name"]=> string(24) "Quarterly/Annual Figures" ["count"]=> int(96) } [8]=> array(2) { ["name"]=> string(14) "Product Launch" ["count"]=> int(88) } [9]=> array(2) { ["name"]=> string(23) "Supply Chain Disruption" ["count"]=> int(87) } [10]=> array(2) { ["name"]=> string(20) "Business Development" ["count"]=> int(64) } [11]=> array(2) { ["name"]=> string(12) "Stock Market" ["count"]=> int(63) } [12]=> array(2) { ["name"]=> string(18) "General Investment" ["count"]=> int(60) } [13]=> array(2) { ["name"]=> string(13) "Collaboration" ["count"]=> int(60) } [14]=> array(2) { ["name"]=> string(11) "Acquisition" ["count"]=> int(55) } [15]=> array(2) { ["name"]=> string(31) "Financial Update/Profit Warning" ["count"]=> int(53) } [16]=> array(2) { ["name"]=> string(18) "Expansion & Growth" ["count"]=> int(53) } [17]=> array(2) { ["name"]=> string(19) "Economic Conditions" ["count"]=> int(49) } [18]=> array(2) { ["name"]=> string(15) "Market Movement" ["count"]=> int(48) } [19]=> array(2) { ["name"]=> string(5) "Award" ["count"]=> int(45) } [20]=> array(2) { ["name"]=> string(24) "Systemic Risk Management" ["count"]=> int(44) } [21]=> array(2) { ["name"]=> string(27) "Supply Chains Vulnerability" ["count"]=> int(42) } [22]=> array(2) { ["name"]=> string(12) "Board Change" ["count"]=> int(42) } [23]=> array(2) { ["name"]=> string(8) "Epidemic" ["count"]=> int(40) } [24]=> array(2) { ["name"]=> string(5) "Legal" ["count"]=> int(38) } [25]=> array(2) { ["name"]=> string(5) "Event" ["count"]=> int(33) } [26]=> array(2) { ["name"]=> string(15) "Labor Practices" ["count"]=> int(33) } [27]=> array(2) { ["name"]=> string(19) "Green & Responsible" ["count"]=> int(32) } [28]=> array(2) { ["name"]=> string(12) "Staff hiring" ["count"]=> int(31) } [29]=> array(2) { ["name"]=> string(18) "Ecological Impacts" ["count"]=> int(30) } } } 694c2-us-gartner-inc

Gartner, Inc.

Location

Connecticut

Founded

1979-02-28

Website

https://www.gartner.com

Articles

3458 Articles

Category

Commercial Economic, Sociological, and Educational Research

Management Services

Management Consulting Services

Description

Gartner is a company that delivers actionable, objective insight to executives and their teams. They provide expert guidance and tools to enable faster, smarter decisions and stronger performance on an organization's mission-critical priorities. Gartner has been providing insights and expert guidance to clients' enterprises worldwide for over 40 years. They work with businesses in nearly 90 countries and have over 19,500 associates in approximately 85 offices globally. Gartner offers research and advisory services, conferences, consulting, and more. They also have a commitment to diversity, equity, and inclusion. Gartner's website provides more information about their services, leadership, and corporate responsibility.

Articles

13 best data protection software platforms of 2024

2024-04-15 (techtarget.com)

13 best data protection software platforms of 2024

To keep up with data privacy laws, sophisticated cyberattacks and generative AI's infiltration, learn about this year's top data protection software.

Read more
Elon Musk's AI chatbot Grok has the weakest security, while Meta's Llama is strong: researchers - Decrypt - Plato Data Intelligence

2024-04-07 (zephyrnet.com)

Elon Musk's AI chatbot Grok has the weakest security, while Meta's Llama is strong: researchers - Decrypt - Plato Data Intelligence

Security researchers placed much-hyped guardrails around the most popular AI models to see how resistant they were to jailbreaking, and tested how

Read more
Data Quality Getting Worse, Report Says

2024-04-05 (datanami.com)

Data Quality Getting Worse, Report Says

For as long as “big data” has been a thing, data quality has been a big question mark. Working with data to make it suitable for analysis was the task

Read more
MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era

2024-04-02 (securityboulevard.com)

MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era

It’s a digital swindle as old as the internet itself, and yet, as the data tells us, the vast majority of security incidents are still rooted in the low-tech art of social engineering. Related: AI makes scam email look real... (more...)

Read more
Cybersecurity Mesh: Overcoming Data Security Overload

2024-03-28 (securityweek.com)

Cybersecurity Mesh: Overcoming Data Security Overload

What to consider when assessing vendors that promise to unlock the power of a cybersecurity mesh architecture.

Read more
Regulations set to cyber-secure the supply chain - Techerati

2024-03-27 (techerati.com)

Regulations set to cyber-secure the supply chain - Techerati

By 2025, 45% of organisations may face supply chain attacks. Prioritising supply chain security beyond regulations is vital for resilience.

Read more
Nametag, Indian academics, Intercede strengthen MFA with biometrics, passkeys

2024-03-26 (biometricupdate.com)

Nametag, Indian academics, Intercede strengthen MFA with biometrics, passkeys

As deepfake threats rise, enterprises are losing faith in the security of identity verification and authentication without further protection.

Read more
Cybersecurity Trends: Top 10 ETFs For Cyber Defense

2024-03-22 (yahoo.com)

Cybersecurity Trends: Top 10 ETFs For Cyber Defense

In this article, we discuss 10 ETFs for cyber defense. If you want to skip our discussion on the cybersecurity industry, head over to Cybersecurity Trends: Top 5 ETFs For Cyber Defense. In 2024, Gartner predicts several significant cybersecurity trends driven by Generative AI( GenAI), unsecure

Read more
The 18 most important data catalog tools and technologies

2024-03-22 (computerweekly.com)

The 18 most important data catalog tools and technologies

There are numerous tools for creating and managing data catalogs. In this article you will find the 18 most popular data catalog platforms.

Read more

Newsletter subscription