Gartner Blog Network

Posts from Date:   2014-2

Where are the information security hoodies?

by Joerg Fritsch  |  February 24, 2014

About half a year ago I sat in a presentation of my colleague Frank Buytendijk who said that one of the facets of this Big Data thing is the conflict between the “hoodies” and the “suits”. The suits have been doing the thing for ages and do it as conservative as it can get. Transactions, the CAP Theorem, Consistency. The […]

Read more »

Look ma no perimeter!

by Joerg Fritsch  |  February 16, 2014

In October 2013 I was very surprised when I read that the Jericho Forum had declared success and chose to “sunset”. A statement published by The Open Group (http://blog.opengroup.org/2013/10/29/jericho-forum-declares-success-and-sunsets/) declares that the Jericho Forum has achieved a “landmark victory” by making Deperimaterization an established fact. –I was amazed, because after years and years of waiting […]

Read more »

Deception cont’d: How to defend yourself against semantic attacks?

by Joerg Fritsch  |  February 11, 2014

A large number of attacks need successful spear phishing as necessary precursor. To me spear phishing falls into the larger group of “semantic attacks”. For example, semantic attacks can deceive us into assigning the wrong meaning to an email and the actions or information requested therein. Eventually we believe that what we are doing is […]

Read more »

About commingling Virtual Machines

by Joerg Fritsch  |  February 3, 2014

An inquiry that pops up every now and then is whether a computing node with a hyper-visor installed should be considered good enough to segregate virtual machines with different security levels such as the front end (web server) tier and the database tier, –that could well be an ERP, of an eCommerce platform. You get […]

Read more »