Blog Posts Tagged with "Third Party"

69dafe8b58066478aea48f3d0f384820

Social Networkers Blindly Joining "Connect.me"

March 09, 2011 Added by:Headlines

Users are asked to allow the service's application to interface with their LinkedIn, Facebook, and Twitter accounts. According to Cluley's research, potentially thousands of people have already done so. The problem is, no one is entirely sure what Connect.me is...

Comments  (0)

7e364bbac217114a59e547b354e7f7ad

It Was Developed By A Third Party… Of Course It’s Secure!

March 01, 2011 Added by:Gary McCully

I recently participated in an Internal Attack and Penetration Assessment where I encountered a third party web application which contained various vulnerabilities. These vulnerabilities could be linked together in such a way that remote code execution on the underlying operating system was possible...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Risks: Betting With Other People's Money

February 11, 2011 Added by:Rafal Los

The company made a conscious decision, at the board level to stick its head in the sand. After doing some complex mathematical calculations and figuring out what a full-scale Software Security Assurance program would cost versus what it costs to pay fines and lawyers, they've decided on the latter...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Why the Cloud is a Security Nightmare

January 27, 2011 Added by:Dan Dieterle

Hackers will leverage the power of the cloud themselves to attack government and enterprise encrypted systems. Recently, it was shown that WPA encryption could be cracked using the computing power of the cloud...

Comments  (4)

7e6249b5c7f6b63c28587c820b16edcb

SaaS: Accountability Can Get Lost - Not Liability

January 10, 2011 Added by:Robert Gezelter

Pay-as-you-go applications have undeniable allure. Pay-as-you-go providers have had a major impact, whether characterized as SaaS or ASP. They are now often seen as far more cost-effective means of providing applications than in-house hosting. Taken at face value, the savings seem irresistible...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threats at the Executive Level

December 20, 2010 Added by:Headlines

The insider threat is particularly troublesome for organizations, as the the perpetrators have access to the most confidential of information, and breach detection usually only occurs after the damage is done...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Thirteen Million deviantART Accounts Exposed

December 17, 2010 Added by:Headlines

The exposure was due to security lapses at Silverpop System, a marketing company that handles member communications for deviantART. The companies stated that no passwords were accessed, and that the biggest threat will be an influx of SPAM for the account holders exposed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Amazon's WikiLeaks Ban Breeds Cloud Insecurity

December 15, 2010 Added by:Headlines

They played into the biggest fear that cloud critics have, and that’s the general sense of unease when your content is in another company’s control. If Amazon decides you aren’t playing by the rules, you could be in the penalty box and your business severely compromised...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How To Risk-Base Supply Chain Vendors Under FCPA

November 25, 2010 Added by:Thomas Fox

The Supply Chain probably does not command your Compliance Department attention as do other types of third party business partners. This may be coming to an end as most Compliance Professionals recognize that third parties which supply goods or services to a company should be scrutinized...

Comments  (1)

Page « < 1 - 2 - 3 > »