Guru
								
							
						Work experience
IT-Harvest
       Chief Research Analyst
      (			
			-
			Present
		)
saf ai Inc
      Advisory Board Member
      (						
			-
			
		)
..see more
		Quick Heal
      Board Member
      (			
			-
			Present
		)
Anitian
      Member of Board of Directors
      (			
			-
			Present
		)
Phosphorus Cybersecurity
      Member of Advisory Board
      (			
			-
			Present
		)
Areas of Expertise
About
United States
      
							
	Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents.  He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and  Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London.  His latest book Security Yearbook 2025 was published by Wiley in April, 2025.
	...see more
							Analysts with similar expertise
				Aparna Sundararajan
					
						Strategic Advisor - Secure AI at Rain Consulting Services
					
				
				
				Alejandro Leal
					
						Senior Analyst at KuppingerCole Analysts
					
				
				
				Evgeniy Kharam
					
						Founder at EK Cyber and Media Consulting
					
				
				
			
			Read Portworx: Driving Data Services and Making Developers’ Lives Easier
		
		
		  
		
			
	
						
		
	
				Data
			
			Portworx: Driving Data Services and Making Developers’ Lives Easier
			1 min
		
			
			Read Radware: Bot Mitigation is Key for Application Protection
		
		
		  
		
			
	
						
		
	
				Security
			
			Radware: Bot Mitigation is Key for Application Protection
			1 min
		
			
			Read Beyond Identity: Software Supply Chain Attacks and the Best Defence
		
		
		  
		
			
	
						
		
	
				Security
			
			Beyond Identity: Software Supply Chain Attacks and the Best Defence
			1 min
		
			
			Read Omada: The Pitfalls of IGA Deployments
		
		
		  
		
			
	
						
		
	
				Security
			
			Omada: The Pitfalls of IGA Deployments
			1 min
		
			
			Read Censys: The World of Attack Surface Management
		
		
		  
		
			
	
						
		
	
				Emerging Technologies
			
			Censys: The World of Attack Surface Management
			1 min
		
			
			Read Darktrace: The Fast and Furious Nature of Cybersecurity
		
		
		  
		
			
	
						
		
	
				Security
			
			Darktrace: The Fast and Furious Nature of Cybersecurity
			1 min
		
			
			Read Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction
		
		
		  
		
			
	
						
		
	
				Security
			
			Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction
			1 min
		
			
			Read GitGuardian: Secrets in the Source Code Need Protection
		
		
		  
		
			
	
						
		
	
				Security
			
			GitGuardian: Secrets in the Source Code Need Protection
			1 min
		
			
			Read Bugcrowd: Using Crowdsourcing to Detect Critical Vulnerabilities
		
		
		  
		
			
	
						
		
	
				Security
			
			Bugcrowd: Using Crowdsourcing to Detect Critical Vulnerabilities
			1 min