Skip to main content
Home Home
  • Podcasts
  • Tech Articles
  • Top 10s
  • Content
    Topics
    • AI
    • Data
    • Emerging Technologies
    • Infrastructure Management
    • Security
    • In The News
    Media
    • Tech Articles
    • Podcasts
    • Top 10s
    • Whitepapers
    • Press Releases
    • Video Resources
  • Solution Providers
  • Industry Leaders
  • Sign In
  • Join the community
Home
Get Started
  • Access expert IT resources for free
  • Discover actionable insights from industry experts
  • Network with IT professionals and grow your network
  • Unlock exclusive analyst-led content
  • Share your thoughts with our global IT community
Coming Soon...
  • Access free expert IT resources
  • Network with professionals and industry leaders
  • Gain exclusive insights from a global IT community

Or

Sign up with LinkedIn
Sign up with Github
Sign up with Google
Signup as business
Already have account?
Privacy Policy
Contact us
Showing results for
  • Content
  • Industry experts
  • Solution providers
  • Events
No matches found
Explore by topics
Explore by type
Loading content ...
Loading content ...
Loading content ...
No result found for
Podcasts
Tech articles
Top 10s
  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security
  • In the news
  • Press release
  • Video resources
  • Whitepapers
Industry Leaders
Media partners
Solution Providers
Events
  • About us
  • Contact us
  • FAQs
em360tech image
Guru

Richard
Stiennon

Chief Research Analyst at IT-Harvest
19 followers
0 following
Message
Follow

Work experience

IT-Harvest
Chief Research Analyst
( Nov 2017 - Present )
saf ai Inc
Advisory Board Member
( Mar 2022 - Aug 2023 )
..see more
Quick Heal
Board Member
( Sep 2021 - Present )
Anitian
Member of Board of Directors
( May 2019 - Present )
Phosphorus Cybersecurity
Member of Advisory Board
( Feb 2019 - Present )

Areas of Expertise

  • Security

About

United States
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2025 was published by Wiley in April, 2025.

...see more

Social media links

Analysts with similar expertise

Aparna Sundararajan
em360tech image

Aparna Sundararajan

Strategic Advisor - Secure AI at Rain Consulting Services
Alejandro Leal
em360tech image

Alejandro Leal

Senior Analyst at KuppingerCole Analysts
Evgeniy Kharam
em360tech image

Evgeniy Kharam

Founder at EK Cyber and Media Consulting
View more
Read Portworx: Driving Data Services and Making Developers’ Lives Easier
portworx
Data
Portworx: Driving Data Services and Making Developers’ Lives Easier
1 min
Read Radware: Bot Mitigation is Key for Application Protection
radware
Security
Radware: Bot Mitigation is Key for Application Protection
1 min
Read Beyond Identity: Software Supply Chain Attacks and the Best Defence
em360tech image
Security
Beyond Identity: Software Supply Chain Attacks and the Best Defence
1 min
Read Omada: The Pitfalls of IGA Deployments
em360tech image
Security
Omada: The Pitfalls of IGA Deployments
1 min
Read Censys: The World of Attack Surface Management
em360tech image
Emerging Technologies
Censys: The World of Attack Surface Management
1 min
Read Darktrace: The Fast and Furious Nature of Cybersecurity
em360tech image
Security
Darktrace: The Fast and Furious Nature of Cybersecurity
1 min
Read Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction
 ciam podcast em360
Security
Beyond Identity: CIAM and Hitting a Balance Between Security and Customer Friction
1 min
Read GitGuardian: Secrets in the Source Code Need Protection
em360tech image
Security
GitGuardian: Secrets in the Source Code Need Protection
1 min
Read Bugcrowd: Using Crowdsourcing to Detect Critical Vulnerabilities
em360tech image
Security
Bugcrowd: Using Crowdsourcing to Detect Critical Vulnerabilities
1 min
EM360Tech Homepage em360tech.com

Access the latest analyst-led podcasts, tech articles, and industry resources as you connect with some of the brightest minds in enterprise tech.

  • x-icon x.com
  • linkedin-icon LinkedIn
  • youtube-icon YouTube

Topics

  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security

Resources

  • Articles
  • Podcasts
  • Top 10s
  • Videos
  • Whitepapers

Collaborators

  • Events
  • Experts
  • Media Partners
  • Solution Providers

Company

  • About
  • Blogs
  • FAQ
  • Our Services

Subscribe to the EM360Tech Newsletter

  • Contact Us
  • Our Services
  • Blogs
  • Privacy Policy
  • Editorial Policy
  • GDPR Policy
  • Sitemap

All rights reserved. ©2025

Enterprise Management 360