Jay Heiser

A member of the Gartner Blog Network

Archives for February, 2012


We’ve all got spy cameras in our pocket

by Jay Heiser  |  February 27, 2012  |  Comments Off

Today, everybody has a sophisticated spy camera hidden on their telephone, and it doesn’t take a degree in espionage to use them.

Comments Off

Category: Policy security     Tags: , , , , , ,

Megaupload and SaaS Escrow

by Jay Heiser  |  February 15, 2012  |  Comments Off

Other than some analysis and speculation about how the takedown changed traffic patterns without actually reducing global piracy, and regular reports about the legal status of Kim Dotcom, the Megaupload drama hasn’t provided much in the way of news for a couple of weeks. On the theory that putting the string ‘Megaupload’ into the title of […]

Comments Off

Category: Cloud risk management Vendor Contracts     Tags: , ,

Are your executives ‘privileged users’?

by Jay Heiser  |  February 14, 2012  |  Comments Off

While I would hope that the CEO of a major technology firm (albeit a somewhat diminished firm in this case) does not have a copy of the root password, the idea of ‘executive privilege’ maybe needs to be rethought.

Comments Off

Category: security     Tags: , ,

Megaupload is world’s biggest hot potato

by Jay Heiser  |  February 3, 2012  |  1 Comment

The dozens of petabytes of Megaupload data belonging to millions of Internet users is manifesting itself as a giant hot potato, currently burning a cashflow and PR hole into the bottom lines of several global hosting firms.

1 Comment »

Category: Cloud risk management security     Tags: ,

Megaupload’s Black Swan Song

by Jay Heiser  |  February 1, 2012  |  Comments Off

Last November, Gartner analyst Richard Hunter and I published research entitled ‘Black Swans’ Are Sure to Fly in the Public Cloud.  Based on ideas popularized by Nassim Nicholas Taleb (The Black Swan: The Impact of the Highly Improbable, Random House, 2007), we strongly urged the users of cloud-based services to plan for the possibility of “severe failure with […]

Comments Off

Category: Cloud risk management security     Tags: ,