Blog Posts Tagged with "Marketing"

B09c361cbdc6cf629affdc7db30a186d

Brand Statements Tell Your InfoSec Story

January 17, 2013 Added by:Steven Fox, CISSP, QSA

Listening to bad brand statements is like sitting through a bad movie or comedy skit. Yes, I am among those who stand politely as a vendor tries to sell me something without bothering to determine what I actually care about. At least I get to learn about bad brand stories...

Comments  (0)

C67c179cd59e50f867e06086f5b2d21f

The Security Reality of Road Warriors

October 28, 2012 Added by:Barrie Hadfield

Marketing and sales professionals will, inevitability, require a cloud-based collaboration processes or they face a potential competitive disadvantage. Therefore, IT executives are best-served by investigating the rate at which their employees are using unsanctioned tools that facilitate potential breaches...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Marketing to the Cynical, Skeptical, and Jaded

August 24, 2012 Added by:Jack Daniel

Words like engagement and community are overused by charlatans, marketing gurus, and social media experts- but if you cut the crap and actually engage the community, people will pay attention. Influencer is another abused term, but some people have more of a voice in the community than others. Ignoring people who aren’t ready to buy could be a very bad idea...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

UP and to the RIGHT: Strategy and Tactics of Analyst Influence

July 23, 2012 Added by:Ben Rothke

If up and to the right is the desired Magic Quadrant location, how does one get there? For many tech firms, they often are clueless. In this book, Stiennon provides clear direction. For those looking to make the expedition to the land of Gartner, this book is a veritable Berlitz Guide on how to make the journey...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Security Factions: Roosters and Owls

July 11, 2012 Added by:Infosec Island Admin

We have lobbying going on between two factions and all too often, the roosters are the ones being heard with their cry that the apocalypse is upon us, our water supply has been hacked, our power grid is a spiders thread away from utter collapse and youu my friend, are about to be plunged back into a zombie apocalypse...

Comments  (1)

0ff0a77035f9569943049ed3e980bb0d

Security Vendors: Absit Reverentia Vero

July 09, 2012 Added by:

Vendors are driven to sell and sell at all costs. Product features stagnate, services under perform. We the customers suffer and the security postures of all organizations plummets. Adversaries can spend less on penetration innovation while at the same time more easily bypass our defenses...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Security Slide Rules

June 29, 2012 Added by:Wendy Nather

First off, there must be a slide talking about The Problem We All Face and that it’s a scary, scary world out there, otherwise I would forget why we’re all here. Next, there must be a slide that includes icons of people, the cloudernet, and either monitors or CPUs. Extra points for creatively drawn bad guys...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Is There Such a Thing as Too Much Security?

June 18, 2012 Added by:Lee Munson

People who are in the computer security business are using too many scare tactics. Instead of informing the customer properly they are trying to scare them into using the company’s products. That is never a good thing and it is the reason why we have so much of a backlash going on now...

Comments  (2)

Ba47ee356d05807f7e87764f6d3f7e12

Booth Babe Challenge: Show Me the Money

June 18, 2012 Added by:Michelle Klinger

The general consensus regarding whether booth babes are appropriate is a resounding NO, yet vendors still find it necessary to use this strategy. Even amidst complaints by conference attendees & public mocking on social media sites, vendors stick to their marketing guns and bust out the busty femaninas...

Comments  (0)

F2792196079f2c16cd02be6e9ff5b3da

The Fear Factor in Information Security

June 13, 2012 Added by:DHANANJAY ROKDE

Vendors are increasingly using the fear factor and coarse tactics to pressure information security managers into deploying rather unnecessary technologies and products. Why have we never heard of a vendor pitch claiming responsibility of failure to protect a company’s infrastructure?

Comments  (0)

65be44ae7088566069cc3bef454174a7

Big Brother Likes Big Data: Balancing Privacy with Innovation

June 05, 2012 Added by:Rebecca Herold

Big Data and associated analytics can be used to improve business and customer experiences and bring innovation and medical breakthroughs. However, organizations must make sure they don’t cross that line of customization and business improvements into creepiness and full-blown privacy invasion...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Flamer: I Can Haz Propaganda...

May 31, 2012 Added by:J. Oquendo

Studies on malware by vendors are not being done for anything other than being able to state: "We can defend you from MalwareX if you purchase Product Y." This is the reality of it. What better mechanism to do so than to paint the boogeyman as a rogue country. After all, countries spend millions on security...

Comments  (0)

94c7ac665bbf77879483b04272744424

The Virtual Sky is Falling!

May 28, 2012 Added by:Marc Quibell

Opportunists are using an alarmists strategy, bolstered by bloated opinions, to get you to buy their stuff. IT Sec businesses and vendors are not objective sources for security trends, threats and/or events. They are advertisements...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Is Frictionless Sharing Like Digital Privacy Cancer?

May 25, 2012 Added by:Rebecca Herold

In a nutshell, “frictionless sharing” basically is a passive service that allows apps to automatically share your activity to a very wide number of entities and locations as you visit different websites, view videos and photos, listen to music, read ads and articles, and so on...

Comments  (3)

7ddc1f3000a13e4dfec28074e9e7b658

Twitter Commits to Respecting Do Not Track with New Policy

May 21, 2012 Added by:Electronic Frontier Foundation

This doesn’t mean Twitter will stop collecting all data on you. They’ll still be able to collect aggregate data about your browsing habits for analytics and security, but they won’t set a cookie and they won’t use data to suggest users to you or for tailoring your Twitter experience...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec is Not a Religion

May 14, 2012 Added by:Infosec Island Admin

Infosec is not a religion. There are no Cardinals, there are no Bishops, there are only a bunch of people who want their opinion to be heard and listened to ad nauseum. It’s as simple as that, and if you start clothing it in the robes of ecclesiastical rhetoric, you FAIL...

Comments  (2)

Page « < 1 - 2 - 3 - 4 > »