Blog Posts Tagged with "Solutions"
May 28, 2012 Added by:Marc Quibell
Opportunists are using an alarmists strategy, bolstered by bloated opinions, to get you to buy their stuff. IT Sec businesses and vendors are not objective sources for security trends, threats and/or events. They are advertisements...
January 31, 2012 Added by:Rafal Los
Cloud computing provides the customer an unparalleled chance to jump into a new computing paradigm which sheds some of the legacy issues and the excessive costs associated with unused capacity most of our organizations have humming along in our data centers...
December 08, 2011 Added by:Rafal Los
The glut of blinking lights and devices that require time and effort to manage has gotten out of control... or so I'm being told. I've not manged a security team in 4 years now, but even back then the glut of boxes, products and solutions was becoming too much to bear. I can only imagine it now...
October 12, 2011 Added by:Simon Heron
The trouble is that technology is just one element of the solution. There is little doubt that while DLP software and devices can help, there is no single solution that can encompass all aspects of DLP, as different types of data have different threats and hence need different controls...
July 12, 2011 Added by:Infosec Island Admin
Infosec Island will be conducting a series of video interviews with companies and vendors at the Black Hat USA 2011 conference in Las Vegas, NV. The interviews offer the opportunity for companies to highlight their knowledge of emerging trends in the information security field...
February 27, 2011 Added by:Brad Bemis
You know you have an issue, you think up a technical solution, you ask about various vendor offerings, you read marketing literature; you listen to a vendor give a product pitch. The solution sounds good, so you buy it, plug it in, then watch it fall short of pretty much every expectation you had...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013