Blog Posts Tagged with "vendors"

850c7a8a30fa40cf01a9db756b49155a

The Emperor's Advanced Persistent Clothing

March 12, 2012 Added by:J. Oquendo

When "experts" start believing their own hodge-podge of "truths", it spreads like a cancer and ends up in the ears of decision makers. When will security pros stop focusing on marketing in hopes of selling shares of the Brooklyn Bridge and focus on actually securing something?

Comments  (3)

Bd623fa766512fdf6b57db66f522b741

Who Fights for the Users?

March 11, 2012 Added by:Ali-Reza Anghaie

The No More Free Bugs effort has changed the landscape by which security research is done. Before, you had one monetized market for such research - the black market. Now a new player has entered the fray - Government - and I'm not entirely sure I like where this is going...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

RSA Conference 2012 Wrap-Up

March 04, 2012 Added by:Robb Reck

RSA 2012 is in the books. The crypto-geniuses have gone home and are again working on solving our most challenging technical problems. The rest of us have returned home with some new insights and an improved plan for implementing security in our own little corners of the world...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

A Checklist for a Move to the Cloud

February 26, 2012 Added by:Ben Kepes

There’s s flip side to technology democratization in that the high level of accessibility also means that it’s very easy for organizations to set themselves up as vendors – sometimes without the necessary level of professionalism that would be optimal...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Abandon FUD, Scare Tactics and Marketing Hype

February 25, 2012 Added by:Rafal Los

Perhaps it is security professionals' diminished tolerance for FUD, or perhaps there is a collective awakening to the bigger picture, or it was just time for the chickens to come to roost. No matter, this drastic anti-FUD backlash is strong and I for one say it's about time...

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

Cyber Security: The Sky is Falling

February 24, 2012 Added by:J. Oquendo

Common sense dictates that there is a lot of money to be made in "cyberlandia", and someone is going to make it by using any boogeyman available. Cyber is the new Gold Rush, however much of what is being portrayed by the media is blown out of proportion and unrealistic...

Comments  (8)

68b48711426f3b082ab24e5746a66b36

Application Software and Security: A Tale of Two Market Sizes

February 19, 2012 Added by:Fergal Glynn

We spend 0.3% of what we pay for software on ensuring that it is secure. Now you can argue that manual testing is not included. However, even when you account for this variance, the gap in what we spend to buy software and what we spend to secure it is huge...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

How I Learned to Stop Worrying and Love Cyberwar

February 16, 2012 Added by:Infosec Island Admin

Sure, there are potential issues with regard to infrastructure and hacking/warfare, but, it is not such that we need to frame it and clothe it in the ripped flag of 9/11 do we? Obviously these guys all think so. I would beg to differ, and I find it shameful...

Comments  (1)

7477d0986a135e5e948d70e9995a609c

Information Security Relief is Spelled ISO-27001

February 15, 2012 Added by:John Verry

No matter the industry or service offering, organizations processing data on behalf of clients are experiencing the pain of proving they are secure and compliant with client standards and the myriad of regulations which their clients are obligated. ISO-27001 spells relief...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Tips for Organizations Heading to the Cloud

February 09, 2012 Added by:Ben Kepes

Identify the data that is touched by each IT process. Is there any data that has to stay in-house for security or compliance reasons? You may need to change IT processes so the sensitive data is not affected by the transition...

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Designing Security with Brand in Mind

February 06, 2012 Added by:Steven Fox, CISSP, QSA

Why is it important to deliver security services consistent with your brand? The fundamental archetype created by your brand must be supported by behaviors which confirm its relevance. Performance that is inconsistent will lead your customers to question your brand promise...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Best Ways for Businesses to Prevent Data Breaches

February 01, 2012 Added by:Danny Lieberman

Most security breaches are attacks by insiders and most attackers are trusted people that exploit software system vulnerabilities (bugs, weak passwords, default configurations etc…). Neither security awareness nor UAC are effective...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Software Vendor Access to Customer Data

January 30, 2012 Added by:Ben Kepes

The issue is a massive one for the industry and in a back-channel discussions a number of people made comments regarding how much of a risk to the cloud industry service provider access to data is. One person went on to say that this perception is poison to sales growth...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

BSides San Francisco Feels RSA Conference Pressure

January 30, 2012 Added by:Jack Daniel

The RSA Conference organizers are enforcing a non-compete clause in their sponsor and exhibitor agreements which is forcing several Security BSides sponsors to withdraw their funding, leaving the free community-oriented BSidesSF event at risk...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Spending Your 2012 IT Security Budget - Beware of Cheap

January 28, 2012 Added by:Rafal Los

If you can't be good, be cheap - the battle cry of the second-rate vendor. After spending 4 years as part of a world-class sales organization, I can tell you that with no uncertainty that I've seen some of my competitors do some absolutely insane things to compete...

Comments  (3)

959779642e6e758563e80b5d83150a9f

Security is in the Cracks

January 26, 2012 Added by:Danny Lieberman

In preparing to implement an application for financial management, CRM, data mining or ERP, something in the back of your mind probably says the vendor’s development organization is not a lot different than yours - though you hope they’ve thought through the security issues first...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »
Most Liked