{"id":2104,"date":"2005-08-22T00:00:00","date_gmt":"2005-08-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/08\/22\/gartners-latest-on-tablet-pcs-social-tagging-and-other-emerging-technologies\/"},"modified":"2021-12-30T11:40:40","modified_gmt":"2021-12-30T11:40:40","slug":"gartners-latest-on-tablet-pcs-social-tagging-and-other-emerging-technologies","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/08\/22\/gartners-latest-on-tablet-pcs-social-tagging-and-other-emerging-technologies\/","title":{"rendered":"Gartner&#8217;s latest on tablet PCs, social tagging, and other emerging technologies"},"content":{"rendered":"<p>Innovative approaches to security are underway according to&nbsp;Gartner. &nbsp;AT&amp;T provides a range of network-based security services and startups like VigilantMindsa, Prolexic Technologies and Perimeter Internetworking insert themselves into the cloud, similarly to how anti-spam filtering services insert themselves into the e-mail flow.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>First a&nbsp;good analogy: &#8220;In the history of business and consumer use of the Internet, the vast majority of security approaches have relied on customer premises equipment \u2014 security hardware and software at the edge of every business or on the PC of every consumer. <strong>This is the equivalent of the water company telling you to put water purifiers onto the water pipe into your house because it is sending you many poisonous substances mixed into your water<\/strong>.&#8221;<\/p>\n<p>Despite usability and liability obstacles, few would argue that &#8220;immunizing&#8221; the network for cyber threats this way doesn&#8217;t make sense. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2104","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2104"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2104\/revisions"}],"predecessor-version":[{"id":4591,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2104\/revisions\/4591"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}