Blog Posts Tagged with "vendors"
June 14, 2012 Added by:J. Oquendo
Flame is a very loud piece of malware. It is a horrendous 20Mb contraption which screams: "look at me." Many of the components in Flame are borrowed, re-hashed, re-written and re-deployed. AV companies are suggesting there is "no financial gain" being sought by Flame and to that I state: "How would you know?"
June 13, 2012 Added by:DHANANJAY ROKDE
Vendors are increasingly using the fear factor and coarse tactics to pressure information security managers into deploying rather unnecessary technologies and products. Why have we never heard of a vendor pitch claiming responsibility of failure to protect a company’s infrastructure?
June 11, 2012 Added by:Danny Lieberman
The short answer is that you should not store PHI (protected health information) on Dropbox since they share data with third party applications and service providers - but the real reason is you should not use Dropbox for sharing information with patients is simply that it is not private by design...
June 11, 2012 Added by:Theresa Payton
How should you protect your precious digital files? The good news is there are many services to choose from. Here is just a short list to review so you can pick what is best for you based on storage options, privacy and security features, and budget...
June 11, 2012 Added by:Ben Kepes
Some cloud vendors are engaged with IT and following a top down adoption approach while others are aiming for a more viral bottom up adoption. What issues do these different approaches raise and how do we navigate this path while ensuring agility and compliance?
June 06, 2012 Added by:Neira Jones
There are numerous third parties and cloud providers around. A few have already achieved a dominant position, but a recent article highlighted that "others have opportunities to get into the act by offering more security and protection". So there you are, security can be a unique selling proposition...
June 04, 2012 Added by:Bill Gerneglia
Beyond managing regulations and liability, companies outsource their IT functions to third parties create infosec privacy and legal difficulties, including loss of control and challenges with enforcement. Risk and compliance obligations do not disappear when using a third-party service provider...
May 31, 2012 Added by:J. Oquendo
Studies on malware by vendors are not being done for anything other than being able to state: "We can defend you from MalwareX if you purchase Product Y." This is the reality of it. What better mechanism to do so than to paint the boogeyman as a rogue country. After all, countries spend millions on security...
May 30, 2012 Added by:Michelle Drolet
While many software publishers don’t bother to release patches, the two that are religious about patching are Microsoft and Adobe. Ironically, they still account for the majority of client-side vulnerabilities, with the Office Suite products and Adobe Flash Player and Reader topping the list...
May 30, 2012 Added by:Joel Harding
Why do I keep running into the phrase Information Warfare? If the discussion is about cyber and warfare in cyberspace, why use the phrase Information Warfare? Has cyber ‘anything’ become so overused that we need to resort to using a much broader term to interest people in a cybersecurity discussion?
May 29, 2012 Added by:Rafal Los
Who should pay for fixes necessary to patch security defects in software? The question is deeper than whether fixes should be made available free of charge for software components that are found to contain issues. There are more costs than simply acquiring the fix here, which is where the conversation changes...
May 28, 2012 Added by:Marc Quibell
Opportunists are using an alarmists strategy, bolstered by bloated opinions, to get you to buy their stuff. IT Sec businesses and vendors are not objective sources for security trends, threats and/or events. They are advertisements...
May 22, 2012 Added by:Wendy Nather
Organizations that are IT-poor tend also to be security-poor because security becomes optional, a luxury and an omission for the small business that doesn't know it has something to lose -- or even if it does, it hasn't the faintest idea of how to address it...
May 22, 2012 Added by:Jack Daniel
The depressing “booth babe” situation is an ongoing embarrassment. In the right contexts, I have nothing against attractive people, fast cars, or other things normally used to sell cheap beer - I just don’t believe that tech and security events are the correct contexts...
May 16, 2012 Added by:Ben Kepes
Purists were adamant that the Private Cloud was flawed and that it could not deliver the benefits of the Public Cloud. On the other hand organizations were highly skeptical of the Public Cloud, listing its shortcomings in terms of security, reliability, compliance and control...
May 16, 2012 Added by:Brent Huston
Sadly, there are more than a few who are struggling to get OOBA right or done at all. As with most things, it helps to do a little research. Organizations should perform due diligence on their vendors and factor vendor risks into the equation of purchases and project planning...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013