Gartner Blog Network

Tag: 'whitelisting' Blog Posts

from the Gartner Blog Network

Virtualization, Containers and Other Sandboxing Techniques Should be on Your Radar Screen

by Neil Macdonald  |  March 16, 2013

  The idea of “sandboxing” potentially malicious content and applications isn’t new but interest in this type of approach on Windows desktops is growing. Further, the increasing variety of virtualization...

Read more »

This Just In: Signature-based Protection Ineffective Against Targeted Attacks

by Neil Macdonald  |  January 31, 2013

  Seriously, is anyone surprised? I’m sure you’ve seen the news about Chinese infiltration at the New York Times: According to the article: Over the course of three months,...

Read more »

Getting Ready for Gartner’s 2012 Infrastructure & Operations and Information Security Summits

by Neil Macdonald  |  May 21, 2012

I’ve been absent from my typical blogging routine getting my material finalized for two Gartner upcoming US-based summits in June 2012. The first is Gartner’s Infrastructure and Operations Management Summit...

Read more »

Windows 8 Raises the Bar for Security

by Neil Macdonald  |  September 28, 2011

I’ve been out the past two weeks visiting with clients and have been meaning to summarize my impression of the upcoming Windows 8 (expected mid 2012) from a security point...

Read more »

Removing Administrator Rights for Windows Users is not “Lockdown”

by Neil Macdonald  |  May 4, 2011

In discussions with clients, I still run into some confusion on whether or not removal of administrator rights constitutes “lockdown”. Perhaps this was the case a few years ago with...

Read more »

Advanced Persistent Threats: Finding the Needle in a Haystack

by Neil Macdonald  |  April 14, 2011

Whether or not you agree with the use of the term “Advanced Persistent Threat” (APT), we can agree that there is a very real threat from advanced intrusions which persist...

Read more »

Are APTs Really New? Observations from the APT Summit

by Neil Macdonald  |  April 4, 2011

I recently had the opportunity to kick off a summit in Washington DC on the topic of Advanced Persistent Threats along with a number of other speakers representing different technologies...

Read more »

Yes, Standard Users can Install Software

by Neil Macdonald  |  March 15, 2011

The conventional wisdom is that a user who is configured with “standard user” privileges (the least possible in Windows 7) cannot install software (or malware for that matter). This is...

Read more »

Lesson from Android: Does More Open Have to Mean Less Secure?

by Neil Macdonald  |  March 11, 2011

Google’s Android has made the news a couple of times already in 2011: Here, with a credit card snooping exploit proof of concept and most recently, with malware that had...

Read more »

NAC, DLP and Application Control: It’s About the Visibility, not the Control

by Neil Macdonald  |  March 9, 2011

Sitting here in the airport getting ready to fly back home, it occurred to me that all of these hyped technologies have had a critical shift in mindset over the...

Read more »