Blog Posts Tagged with "vendor"
Falconstor Software Conspired to Bribe Chase Executives
July 02, 2012 Added by:Headlines
The U.S. Attorney’s Office filed a criminal complaint against FalconStor Software, a data storage and protection company, alleging that the company conspired to pay more than $300,000 in bribes to executives of J.P. Morgan Chase Bank to obtain over $12 million in electronic storage licencing contracts...
Comments (0)
VMware Confirms Older Hypervisor Source Code Exposed
April 27, 2012 Added by:Headlines
"Our security team became aware of the public posting of a single file from the VMware ESX source code and the possibility that more files may be posted in the future. The posted code and associated commentary dates to the 2003 to 2004 timeframe..."
Comments (0)
A History of Google's Government Sales
March 14, 2012 Added by:Jeffrey Carr
Every technology company sells to the government, and compared to Microsoft and Apple the google numbers are pretty low. But since Google is more intimate with our search habits and email content than anyone else, these statistics still make me a little uncomfortable...
Comments (0)
VoIP Vendor Ooma Outage: No DoS Attack Involved
August 18, 2011 Added by:Headlines
Customer services were interrupted by a power failure at the company's data center while their corporate website was simultaneously experiencing excessive traffic levels that was initially reported to have been caused by a denial of service (DoS) attack...
Comments (1)
Thoughts on Software Security Assurance from a Like Mind
June 10, 2011 Added by:Rafal Los
Being able to tie exploitable issues in a running application to source code is the Holy Grail of security testing... but it's unlikely you'll get good adoption and success if you're trying to hand a bunch of developers black-box security testing technology...
Comments (0)
Security Vendor Vulnerabilities: It's All About Reaction Time
June 03, 2011 Added by:Rafal Los
Holding a vendor accountable is understandable, since that is their primary business. There's really no excuse when a vendor of security products gets exploited or has a publicly disclosed exploit... well, sort of right? In the final analysis, what is it really all about?
Comments (0)
How to Replace an Enterprise SIEM
May 18, 2011 Added by:Anton Chuvakin
Be prepared to keep the old SIEM running - without paying for the support contract, of course - or at least keep the old data backups – this becomes important if complete data migration is impossible due to architecture differences between the new and old SIEMs...
Comments (0)
Qualys Receives Highest Rating in Gartner Report
May 04, 2011 Added by:Headlines
Qualys can deliver security and compliance in an integrated solution that easily interfaces with existing security solutions without the significant cost and complexity associated with deploying and maintaining traditional enterprise software...
Comments (0)
Source Code is the New Hacker Currency
May 01, 2011 Added by:Rafal Los
The reason we're seeing security companies as a big, bright, shining target recently is that attackers finally realized they were sick of hitting each target individually - and wanted a way to hit millions of high-valued corporate safes all at once, potentially...
Comments (4)
Washington DC Leads Cloud Trend Despite Security Concerns
April 26, 2011 Added by:Headlines
Security risks in the cloud have not prevented the federal government and the private sector from moving to cloud-based strategies which are able to provide a wider range of services at a lower price point than developing systems to accomplish the same tasks individually...
Comments (0)
Advantages of Hosted Software and Data Security
April 14, 2011 Added by:Lindsay Walker
Every workplace has "super-users," people who can hack into systems and extract sensitive information. Having information stored offsite makes it challenging for anyone inside your organization to get their eyes on information they aren't permitted to see...
Comments (0)
She Blinded Me With Infosec...
April 11, 2011 Added by:Infosec Island Admin
One must admit that no matter how many times an assessment is carried out and things are found/exploited there are ALWAYS more vulnerabilities being introduced. You will never get them all and the client, if they understand this, will become inured to it...
Comments (0)
Report: Data Centers Not Prepared for Disaster Recovery
March 31, 2011 Added by:Headlines
“When it comes to disaster recovery, the survey results are indicative of the investment activity we have seen in data centers throughout the recession—focus on immediate needs with business continuity and disaster recovery planning considered a luxury..."
Comments (0)
Security Vendors Vow to Defend Against Cyber-Boogeyman
March 21, 2011 Added by:J. Oquendo
McAfee is making a run to become the security industry's "Minitru". Regardless of my view of the security landscape, I believe that there is an increasing need to share information between companies that are under attack or that have been compromised. However, I doubt this could ever happen...
Comments (4)
Get Back to Basics: Stuxnet and Aurora Lessons
February 24, 2011 Added by:Headlines
The plain fact is that most organizations are falling far short in protecting against the same threats that they've faced for the last 10 years. SQL injection, phishing, malicious attachments, social engineering. Old, every one of them. And yet, still incredibly effective at compromising networks in some of the best-known and theoretically best-protected companies.
Comments (0)
Shoring Up National Cyber Security Infrastructure
February 21, 2011 Added by:Robert Siciliano
Corporations and government agencies are legally required to secure their systems. But no such standards exist for the consumer. No laws require you to take a single step for the sake of your own security. Software vendors should certainly be held accountable if their products aren’t secure...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider