Blog Posts Tagged with "vendors"

3e35900ae6facc6c146a85c435c71d82

Cloud Computer Security Techniques and Tactics

July 27, 2011 Added by:Ben Rothke

Companies are spending billions of dollars migrating applications and data centers to the cloud. One is hard pressed to find many Fortune 500s who have not yet used cloud computing. But in the rush to move to the cloud, many companies have neglected to ensure cloud security is built in...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Federal CIO Vivek Kundra Warns of IT Vendor Cartel

July 22, 2011 Added by:Headlines

In what could best be described as a proclamation reminiscent of Eisenhower's admonition of the powerful "military industrial complex", outgoing Federal CIO Vivek Kundra issued statements warning of security risks compounded by "an IT cartel" of vendors perpetuating big contract boondoggles...

Comments  (1)

E973b16363b3de77b360563237df7e32

The Cloud - Time for Some Serious Consideration

July 15, 2011 Added by:Bozidar Spirovski

The cloud is very ripe for web services. But before you choose one, be careful to do a serious consideration on your pros and cons. If you can match your application/site to a cloud service, you can bring it to a new level of efficient operation...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

The Demise of the Antivirus Industry

July 12, 2011 Added by:Kevin McAleavey

Over the past 30 years, the antivirus industry was used to doing things only one way. And the creative people who came up with unique and sometimes eccentric ways of thinking outside anyone's box all got shunted aside in favor of people who did things "by the book."...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

Black Hat Vegas 2011 Video Interview Opportunity

July 12, 2011 Added by:Infosec Island Admin

Infosec Island will be conducting a series of video interviews with companies and vendors at the Black Hat USA 2011 conference in Las Vegas, NV. The interviews offer the opportunity for companies to highlight their knowledge of emerging trends in the information security field...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

The Birth of the Antivirus Industry

July 11, 2011 Added by:Kevin McAleavey

The entire industry has been entirely sublimated by people who have no real idea of what the mission is and only count beans. And it shows in the quality of work performed by the numerous products across the board to the detriment of those paying them for a task that they're no longer up to...

Comments  (4)

Ba829a6cb97f554ffb0272cd3d6c18a7

Throwing in the Towel: The Sorry State of Client Security

July 07, 2011 Added by:Kevin McAleavey

TDL4 has publicly caused the security industry to transition into full panic mode and literally throw in the towel as the solution to this and other malware continues to elude the industry according to widespread reports, while our attention was distracted by the kiddie wars on the Lulzboat...

Comments  (13)

8c4834b99847b9f7c9ee94b45df086f9

The Benefits of FUD

July 06, 2011 Added by:Emmett Jorgensen

Fear, Uncertainty, and Doubt. Enemy of skeptic IT Pros, ally of marketers. Why do infosec pros talk about FUD in a negative light? Granted, some vendors push the FUD aspects of their marketing a bit too much. However, I think a little FUD can be a healthy thing. Let me explain...

Comments  (4)

E973b16363b3de77b360563237df7e32

Engaging a Team for a Security Analysis

June 29, 2011 Added by:Bozidar Spirovski

Being involved in a security project requires lot of resources: a good measure of knowledge, a huge measure of experience, some amount of software and personnel. Usually time is in short supply, so this is compensated by more computers or more people...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Solution Architecture: A Critical Service or Sales Talk?

June 08, 2011 Added by:Rafal Los

Over time the term has become widely over-used to the point where meaning is largely lost, and sadly most people on the buyer side of the aisle think it's just some marketing term or a way to get them to buy more of whatever widget is being sold...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Impending Doom and IT Security's Downward Spiral

June 06, 2011 Added by:Rafal Los

If you've been in Information Security for any meaningful period of time you can surely side with the frustration and disappointment many of the long-time residents of Infosec-ville are feeling as breach after breach piles on in the news. The result of all of this is a downward spiral...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Is the Cloud More Secure Than a Physical Environment?

May 23, 2011 Added by:Bill Gerneglia

An advantage of the cloud in terms of security is that it is utility based. If you use a managed solution that is flexible, allowing you to pay for its utility, even if you are a small company, then security should be packaged in...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »