{"id":2302,"date":"2004-09-20T00:00:00","date_gmt":"2004-09-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/20\/gartner-information-security-is-still-key\/"},"modified":"2021-12-30T11:41:02","modified_gmt":"2021-12-30T11:41:02","slug":"gartner-information-security-is-still-key","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/20\/gartner-information-security-is-still-key\/","title":{"rendered":"Gartner: Information security is still key"},"content":{"rendered":"<p>Despite claims from some quarters that security will cease to be a key issue over the next few years, Gartner stressed today that information security will remain a major executive concern for the foreseeable future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gartner says the next five years will see new waves of technology rendering existing information security measures obsolete, increasing security exposures in both new and legacy environments.<\/p>\n<p>Wheatman notes how, in recent years, key technologies have forced a constantly changing security environment.  &#8220;In the same way that PCs broke the host-centric security model, networked PCs eroded the gains that had been won in securing individual desktops.  Then we saw how distributed applications running across LANs reset security maturity to zero, while the inclusion of external networks as a part of the topology reset client\/server security.&#8221;<\/p>\n<p>In addition to the constant cycles of technology change that has kept ICT security managers working overtime in recent years, Gartner points to the cyber threats that will ensure information security threats remain constant over the next few years.&#8221;<\/p>\n<p>To enable security managers to evaluate the risks facing their enterprises, Gartner has developed a cyberthreat hype cycle, mapping out the threats that must be taken into consideration.<\/p>\n<p>Gartner says that for those who thought that the information security risks they have battled with in recent years were all but over, this may well be unwelcome news.<\/p>\n<p>In conclusion, Wheatman states: &#8220;Perfect security is impossible, but continual scanning for new vulnerabilities and monitoring for new threats is critical and a much better investment than to passively sit back and wait to detect attacks.<\/p>\n<p>http:\/\/www.ictworld.co.za\/EditorialEdit.asp?EditorialID=20006<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,13],"tags":[],"class_list":["post-2302","post","type-post","status-publish","format-standard","hentry","category-trends","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2302"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2302\/revisions"}],"predecessor-version":[{"id":4789,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2302\/revisions\/4789"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}