Gartner Blog Network

Category: 'perimeter' Blog Posts

from the Gartner Blog Network

The shellshock bug: the known unknowns make me worry!

by Joerg Fritsch  |  September 26, 2014

Sometimes you have a gut feeling. And sometimes you should trust this feeling. I personally believe that this shellshock bug is far more serious than Heartbleed. I say that for...

Read more »

Where are the information security hoodies?

by Joerg Fritsch  |  February 24, 2014

About half a year ago I sat in a presentation of my colleague Frank Buytendijk who said that one of the facets of this Big Data thing is the conflict between the "hoodies" and...

Read more »

Look ma no perimeter!

by Joerg Fritsch  |  February 16, 2014

In October 2013 I was very surprised when I read that the Jericho Forum had declared success and chose to “sunset”. A statement published by The Open Group (http://blog.opengroup.org/2013/10/29/jericho-forum-declares-success-and-sunsets/) declares...

Read more »

Deception cont'd: How to defend yourself against semantic attacks?

by Joerg Fritsch  |  February 11, 2014

A large number of attacks need successful spear phishing as necessary precursor. To me spear phishing falls into the larger group of "semantic attacks". For example, semantic attacks can deceive...

Read more »

About commingling Virtual Machines

by Joerg Fritsch  |  February 3, 2014

An inquiry that pops up every now and then is whether a computing node with a hyper-visor installed should be considered good enough to segregate virtual machines with different security...

Read more »