
Guru
Work experience
IT-Harvest
Chief Research Analyst
(
-
Present
)
saf ai Inc
Advisory Board Member
(
-
)
..see more
Quick Heal
Board Member
(
-
Present
)
Anitian
Member of Board of Directors
(
-
Present
)
Phosphorus Cybersecurity
Member of Advisory Board
(
-
Present
)
Areas of Expertise
About
United States
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2025 was published by Wiley in April, 2025.
...see more
Analysts with similar expertise

Aparna Sundararajan
Strategic Advisor - Secure AI at Rain Consulting Services

Alejandro Leal
Senior Analyst at KuppingerCole Analysts

Evgeniy Kharam
Founder at EK Cyber and Media Consulting
Read What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?

Security
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
23 min
Read From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats

Security
From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
28 min
Read Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?

AI
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
15 min
Read Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges

Security
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
23 min
Read Can You Afford to Ignore Exploitability?

Security
Can You Afford to Ignore Exploitability?
19 min
Read Reducing Risk with Effective Exposure Management in Enterprise Tech

Security
Reducing Risk with Effective Exposure Management in Enterprise Tech
18 min
Read The Innovation Paradox: Security and Productivity in a Regulatory World

Security
The Innovation Paradox: Security and Productivity in a Regulatory World
1 min
Read SCION: The Future of Critical Infrastructure Defence

Security
SCION: The Future of Critical Infrastructure Defence
1 min
Read Automated Network Pentesting: Your Secret Weapon in Cybersecurity - Vonahi Security

Security
Automated Network Pentesting: Your Secret Weapon in Cybersecurity - Vonahi Security
1 min
Read Cybersecurity Automation: Cutting Through the Manual Clutter

Security
Cybersecurity Automation: Cutting Through the Manual Clutter
1 min
Read Guardz: Empower MSPs to Secure & Insure Small Businesses

Security
Guardz: Empower MSPs to Secure & Insure Small Businesses
1 min
Read Cyera: The Future of Data Security in the Age of Artificial Intelligence

Security
Cyera: The Future of Data Security in the Age of Artificial Intelligence
1 min