Gartner Blog Network

Tag: 'security-no-brainer' Blog Posts

from the Gartner Blog Network

Security No-Brainer #7: If You Have Intellectual Property Embedded in Software, Protect it.

by Neil MacDonald  |  July 7, 2009

I saw this in an article today on Bloomerberg: July 7 (Bloomberg) -- Goldman Sachs Group Inc. may lose its investment in a proprietary trading code and millions of dollars...

Read more »

Comments: 5

Oops, I Spoke Too Soon.

by Neil MacDonald  |  June 25, 2009

In my previous post, I talked about the need to encrypt all desktop and server direct attached storage for protection of the data over the lifecycle of the machine, including...

Read more »

Security No-Brainer #6: Encryption Needs to be Extended to All PCs and Servers

by Neil MacDonald  |  June 24, 2009

Most of us know by now that encryption of mobile laptops should be considered mandatory. However, encryption of the direct attached storage used in fixed desktops and servers hasn’t been...

Read more »

Comments: 2

Security No-Brainer #5: Security and Management Tools Need to Work Off of the Enterprise Network

by Neil MacDonald  |  May 11, 2009

In my last post, I talked about several impending inflection points for information security. One of them was: More than half of our employees spend the majority of their working...

Read more »

Security No-Brainer #4: EV-Certificates for ISVs

by Neil MacDonald  |  May 1, 2009

Let me summarize my security no-brainers to date: The first was in reference to a global, industry-wide effort to create a shareable, standards-based application whitelist database built directly from feeds...

Read more »

Comments: 2

Security No-brainer #3: Root of Trust Measurements for Hypervisors

by Neil MacDonald  |  April 18, 2009

During the course of my blogging activities, this is the third time I’ve talked about something the security industry should do that I believe is so obvious that I called...

Read more »

Comments: 1

Whitelisting, Meet Virtualization. Virtualization, Meet Whitelisting.

by Neil MacDonald  |  April 10, 2009

As I have discussed, x86 hardware virtualization creates a new IT platform that must be securely maintained (e.g. patch, configuration and vulnerability management) like any other IT platform we are...

Read more »

Comments: 10

We Need a Global Industry-wide Application Whitelist

by Neil MacDonald  |  April 3, 2009

My previous post on whitelisting has generated a lot of comments. Buried in the comment stream, I made this statement: I look forward to the time (hopefully soon) when an...

Read more »

Comments: 9