Gartner Blog Network

Tag: 'security-summit-na' Blog Posts

from the Gartner Blog Network

Information Security and Big Data–Hype or Hope?

by Neil Macdonald  |  May 22, 2012

I been a proponent of the use of big data analytics techniques being applied to the next-generation of information security problems. Is there bound to be hype? Absolutely. That’s why...

Read more »

Getting Ready for Gartner’s 2012 Infrastructure & Operations and Information Security Summits

by Neil Macdonald  |  May 21, 2012

I’ve been absent from my typical blogging routine getting my material finalized for two Gartner upcoming US-based summits in June 2012. The first is Gartner’s Infrastructure and Operations Management Summit...

Read more »

Cloud Computing can be More Secure

by Neil Macdonald  |  March 31, 2012

In multiple Gartner surveys, security is cited as the number one inhibitor to the adoption of Cloud-based computing. Many IT professionals have a preconceived notion that cloud computing will be...

Read more »

DevOps Needs to Become DevOpsSec

by Neil Macdonald  |  January 17, 2012

DevOps seeks to bridge the development and operations divide through the establishment of a culture of trust and shared interest among individuals in these previously siloed organizations. However, this vision...

Read more »

Sand Castles and Advanced Persistent Threats

by Neil Macdonald  |  July 11, 2011

I’ve been absent from blogging for 2 weeks – first we had the Gartner Information Security Summit in DC and then I took some time off for a much-needed vacation....

Read more »

Real-world Systematic Workload Reprovisioning

by Neil Macdonald  |  June 23, 2011

I’m here at the Gartner Information Security summit on the fourth and final day. We had a record number of attendees – at least 1700 by my estimate. Attendees have...

Read more »

Advanced Persistent Outdoor Threats

by Jay Heiser  |  June 17, 2011

The lack of vegetable compromise lulled me into a false sense of security this year, as clouds of virtual assets thrived in my garden rack space.  Unfortunately, I didn't heed...

Read more »

Don’t Trust Your Servers

by Neil Macdonald  |  June 17, 2011

One of the toughest problems in information security is addressing advanced intrusions that have bypassed traditional security controls and now reside undetected on enterprise systems. With financially motivated attacks and...

Read more »

Improving Security by Killing Server and Desktop Workloads

by Neil Macdonald  |  June 16, 2011

It sounds counterintuitive, but today’s advanced threat environment requires new approaches to the ongoing security and management of server and desktop workloads. The trouble with Advanced Persistent Threats is that,...

Read more »

Do you really need a CISO?

by Jay Heiser  |  June 14, 2011

In the wake of the current series of dramatic news reports about security failures, several of the hacked organizations have just admitting to appointing their first chief information security officer--after...

Read more »