Gartner Blog Network

Category: 'information-security-strategies' Blog Posts

from the Gartner Blog Network

Fads, FUDs and Data Lakes

by Joerg Fritsch  |  August 8, 2014

In short, this blog entry is about using innovation. I am quite surprised by the amount of discussion going on around Data Lakes at the moment. Somehow these arguments are...

Read more »

Laurel and Hardy doing DevOps?

by Joerg Fritsch  |  June 6, 2014

What I love about Laurel and Hardy is that they are two of these extremely seldom silent movie stars that had found their voice by the end of the 20's...

Read more »

Hadoop Summit EU 2014

by Joerg Fritsch  |  April 4, 2014

I wanted to blog about some impressions and personal notes that I made during the EU Hadoopsummit. First impression: it was a huge grab-bag and lots of fun. Vendors and...

Read more »

New reserach on dealing with data center servers

by Joerg Fritsch  |  April 1, 2014

Finally my new research note about data center server security is being published. The research note covers all safeguards that are installed locally on a computing node in order to...

Read more »

Where are the information security hoodies?

by Joerg Fritsch  |  February 24, 2014

About half a year ago I sat in a presentation of my colleague Frank Buytendijk who said that one of the facets of this Big Data thing is the conflict between the "hoodies" and...

Read more »

Look ma no perimeter!

by Joerg Fritsch  |  February 16, 2014

In October 2013 I was very surprised when I read that the Jericho Forum had declared success and chose to “sunset”. A statement published by The Open Group (http://blog.opengroup.org/2013/10/29/jericho-forum-declares-success-and-sunsets/) declares...

Read more »

Deception cont'd: How to defend yourself against semantic attacks?

by Joerg Fritsch  |  February 11, 2014

A large number of attacks need successful spear phishing as necessary precursor. To me spear phishing falls into the larger group of "semantic attacks". For example, semantic attacks can deceive...

Read more »

What information security can learn from Big Data

by Joerg Fritsch  |  January 27, 2014

An other movie that I like very much is the film "Minority Report" from the year 2002. --Made approximately half a decade before AWS EC2 had opened its portals. In...

Read more »