Blog Posts Tagged with "Vendor Management"

F520f65cba281c31e29c857faa651872

Beware of the Private Cloud

November 25, 2010 Added by:Rahul Neel Mani

Dr. Werner Vogels, Chief Technology Officer at Amazon.com, in an interview with Ashwani Mishra, shares his views on the architecture behind Amazon Web Services, the adoption of cloud computing and key issues and trends around it...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How To Risk-Base Supply Chain Vendors Under FCPA

November 25, 2010 Added by:Thomas Fox

The Supply Chain probably does not command your Compliance Department attention as do other types of third party business partners. This may be coming to an end as most Compliance Professionals recognize that third parties which supply goods or services to a company should be scrutinized...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Choosing a Security Consultancy

November 23, 2010 Added by:Javvad Malik

You cannot outsource blame. You HAVE to take responsibility for your organization's mistakes. Whether they be IT, vendor, even mistakes made by your most trusted employees. You don’t have to be an expert in security, you just have to make informed decisions to control your organization...

Comments  (1)

4c1c5119b03285e3f64bd83a8f9dfeec

OS33 and the Abstraction of IT

November 19, 2010 Added by:Ben Kepes

One of the fundamental effects that cloud computing is having is the abstraction of technology provision away from in-house IT and onto third parties. The sheer breadth of services that are being moved to third party cloud providers make this a real step change for the marketplace...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

What Should I Want? Or How NOT to Pick an SIEM

November 12, 2010 Added by:Anton Chuvakin

The allure of asking that question is truly irresistible when dealing with somebody who – presumably – knows more than you do about a particular subject. I am not shocked when a SIEM prospect asks that question of a vendor sales guy or – slightly better – a field engineer...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Zero Trust Security – The Technical Discussion

November 02, 2010 Added by:PCI Guru

It takes strong leadership to keep security off of the back burner. Without that leadership, security will fall into a rut and an incident will occur. So while I think Zero Trust is probably the approach we should all work towards, it will take a lot of effort to make it a reality...

Comments  (1)

959779642e6e758563e80b5d83150a9f

McAfee Pursues Embedded Device Security

September 29, 2010 Added by:Danny Lieberman

The discussion about supporting integration of multi-vendor channels sort of smells like an Intel aphorism, and while it might serve Intel, channel integration may be the exception rather than the rule in the medical device space. When you have a hammer, everything looks like a nail...

Comments  (1)

E973b16363b3de77b360563237df7e32

Telco SLA Parameters and Penalties

June 23, 2010 Added by:Bozidar Spirovski

Communication links provided by Telco providers are critical to most businesses. And as any network admin will tell you, these links tend to have outages, ranging from small interruptions up to massive breakdowns that can last for days.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »