
Guru
Work experience
IT-Harvest
Chief Research Analyst
(
-
Present
)
saf ai Inc
Advisory Board Member
(
-
)
..see more
Quick Heal
Board Member
(
-
Present
)
Anitian
Member of Board of Directors
(
-
Present
)
Phosphorus Cybersecurity
Member of Advisory Board
(
-
Present
)
Areas of Expertise
About
United States
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2025 was published by Wiley in April, 2025.
...see more
Analysts with similar expertise

Aparna Sundararajan
Strategic Advisor - Secure AI at Rain Consulting Services

Alejandro Leal
Senior Analyst at KuppingerCole Analysts

Evgeniy Kharam
Founder at EK Cyber and Media Consulting
Read Portworx: Driving Data Services and Making Developers’ Lives Easier

Data
Portworx: Driving Data Services and Making Developers’ Lives Easier
1 min
Read Radware: Bot Mitigation is Key for Application Protection

Security
Radware: Bot Mitigation is Key for Application Protection
1 min
Read Beyond Identity: Software Supply Chain Attacks and the Best Defence

Security
Beyond Identity: Software Supply Chain Attacks and the Best Defence
1 min
Read Omada: The Pitfalls of IGA Deployments

Security
Omada: The Pitfalls of IGA Deployments
1 min
Read Censys: The World of Attack Surface Management

Emerging Technologies
Censys: The World of Attack Surface Management
1 min
Read Darktrace: The Fast and Furious Nature of Cybersecurity

Security
Darktrace: The Fast and Furious Nature of Cybersecurity
1 min
Read Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction

Security
Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction
1 min
Read GitGuardian: Secrets in the Source Code Need Protection

Security
GitGuardian: Secrets in the Source Code Need Protection
1 min
Read Bugcrowd: Using Crowdsourcing to Detect Critical Vulnerabilities

Security
Bugcrowd: Using Crowdsourcing to Detect Critical Vulnerabilities
1 min