Blog Posts Tagged with "Functionality"

C787d4daae33f0e155e00c614f07b0ee

When Security Requirements Conflict

April 06, 2011 Added by:Robb Reck

Next time an information security expert tells you that a system is secure ask him, “What kind of secure?” We know that choices are always made and vulnerabilities always left unmitigated. Knowing which ones to address and which to accept is what makes a security program effective...

Comments  (0)

B44a73900ca3197c2d8f148e303b3faa

Writing Vendor Requirements to Avoid the Pain

February 27, 2011 Added by:Brad Bemis

You know you have an issue, you think up a technical solution, you ask about various vendor offerings, you read marketing literature; you listen to a vendor give a product pitch. The solution sounds good, so you buy it, plug it in, then watch it fall short of pretty much every expectation you had...

Comments  (0)