Blog Posts Tagged with "Outsourcing"


The Security Poverty Line and Junk Food

April 16, 2012 Added by:Wendy Nather

Organizations below the security poverty line tend to be inordinately dependent on third parties and have less direct control over the security of the systems they use. They end up ceding risk decisions to third parties that they ideally should be making themselves...

Comments  (2)


Cloud Security: Forecast Sunny with Possibility of Showers

April 04, 2012 Added by:Fergal Glynn

Even as companies are adapting to this new paradigm, there are growing concerns about the safety of their data in the cloud. Incidents at cloud service providers like Dropbox highlight dangers of storing information in the cloud...

Comments  (0)


Financial Institutions – Your Time is Coming

April 04, 2012 Added by:PCI Guru

Most financial institutions purchase their software applications from third party development firms. With all of the regulatory changes going on in the financial institution industry, these software firms have been focused on those regulatory changes and not PCI compliance...

Comments  (0)


Reaching for the Cloud: A Contemporary Infosec Perspective

March 21, 2012 Added by:Hani Banayoti

We need to entrust information security to professionals who not only know the fundamental principles and technologies, but are also able to understand and support the business's goals in order to influence and contribute positively to the ongoing infosec challenge...

Comments  (0)


The Patchwork Cloud - What's the Deal with Cloud Security?

March 14, 2012 Added by:Rafal Los

Since everything I've been reading from the press, my colleagues, and analysts I know has been telling me security is ranked high in the top five concerns for cloud computing adoption - an article on ARN by Spandas Lui was like a bucket of ice water to the face...

Comments  (0)


USCC Report on China Misses the Boat on Cyber Espionage

March 13, 2012 Added by:Jeffrey Carr

The report did a good job exploring part of the Supply Chain problem with with chip development. It didn't cover the more common problem of U.S. companies who out-source development work to Chinese firms or companies like Dell who do their manufacturing and R&D in China...

Comments  (1)


Compliance in the Digital Era: Watch Out for the Third Party

February 24, 2012 Added by:Neira Jones

It is crucial that businesses understand which controls are needed to maintain the security of their information assets and it is therefore crucial that suppliers are assessed against the business regulatory and compliance framework...

Comments  (0)


FTC Removed Security Protocols from Website Contract

February 21, 2012 Added by:Headlines

The events appear to be a comedy of errors, where during the long process involved in awarding contracts, critical security requirements were not enforced. As the federal government races to outsource in an effort to cut costs, the risk of oversights become more probable...

Comments  (0)


Gartner: Top Predictions for 2012 and Beyond

January 02, 2012 Added by:Bill Gerneglia

"Instead of requesting that a third-party security vendor conduct testing on the enterprise's behalf, the enterprise will be satisfied by a cloud provider's certificate stating that a reputable third-party security vendor has already tested its applications."

Comments  (0)


Cloud Security – It’s All About Partnership

November 28, 2011 Added by:Ben Kepes

Cloud security is a two way street – both vendors and customers have a part to play in keeping it safe, and both parties need to bring something to the table. But, notwithstanding this fact, Cloud is still the best option for a number of SMB use cases...

Comments  (0)


Maintaining Quality in Outsourcing Telco Services

September 30, 2011 Added by:Bozidar Spirovski

The issue with telco services is that quality is difficult to define because there are parameters that are difficult to track: sound quality, response of system to tone-dial menu selection of an IVR, intermittent interruptions of communications, and temporarily unavailable service...

Comments  (0)


What to Look for in Cloud Security

September 27, 2011 Added by:Robert Siciliano

Cloud-based data, just like local PC-based data, is vulnerable to physical theft if the building isn’t properly protected, power outages if there aren’t redundant power backups, natural disasters, and criminal hacking through system weaknesses, phishing, and social engineering...

Comments  (0)


CIOs Should Earn More Money and Respect

July 22, 2011 Added by:Bill Gerneglia

A few years ago when a CIOs responsibilities consisted of running the IT shop efficiently, it was difficult to make the case that they belonged in the top managerial tier or deserved a seat at the executive conference table. That was then. Today CIOs’ responsibilities have grown significantly...

Comments  (0)


IT Security - Who Watches the Watchmen?

April 27, 2011 Added by:John Nicholson

There are risks associated with allowing your data and applications to sit somewhere else, and some of these risks become more pronounced when you are operating in a cloud-based environment with little assurance about the physical location of your data. However, these risks can be managed...

Comments  (4)


Advantages of Hosted Software and Data Security

April 14, 2011 Added by:Lindsay Walker

Every workplace has "super-users," people who can hack into systems and extract sensitive information. Having information stored offsite makes it challenging for anyone inside your organization to get their eyes on information they aren't permitted to see...

Comments  (0)


Epsilon Breach Deals Another Blow to Cloud Security

April 08, 2011 Added by:Headlines

“Any company that is privileged to manage the information that a company maintains about its customers should be paying attention... Customers will surely start to wonder if they can’t trust these firms with their email addresses..."

Comments  (0)

Page « < 1 - 2 - 3 > »