Items Tagged with "vendors"


B09c361cbdc6cf629affdc7db30a186d

Brand Statements Tell Your InfoSec Story

January 17, 2013 Added by:Steven Fox, CISSP, QSA

Listening to bad brand statements is like sitting through a bad movie or comedy skit. Yes, I am among those who stand politely as a vendor tries to sell me something without bothering to determine what I actually care about. At least I get to learn about bad brand stories...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Companies Must Consider Travel Providers’ Data Practices or Risk Being Harmed

November 04, 2012 Added by:David Navetta

A company responsible for handling billing and settlement for the International Air Transport Association (IATA) has been selling flight booking information about corporate travelers — on a travel agency level — to airlines, hotels and others...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

DMTF's Cloud Infrastructure Standard

September 07, 2012 Added by:Ben Kepes

CIMI is arguably more complex than a simple standard – it reflects that people want to rubber stamp a standard, but also want to deliver proprietary functionality as a point of differentiation from the competition. CIMI is a positive initiative, but the proof is in the pudding...

Comments  (0)

E973b16363b3de77b360563237df7e32

Steps to Ensure a Smooth(er) Migration to a Cloud Service

August 30, 2012 Added by:Bozidar Spirovski

Assuming you have selected a service to migrate to a cloud provider, and have selected the cloud provider, even after contract signing, things may still be far from complete. The migration process is the thing that can be very painful and can break the entire service for an extended amount of time...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Ultimate Breach of Patient Privacy: Real-Time Death on Video

August 29, 2012 Added by:Danny Lieberman

As social media becomes part of the continuum of interaction in the physical and virtual worlds, privacy becomes an issue of discretionary disclosure control. Online privacy and patient privacy will evolve into a market for products and services with stratified pricing, packaging and product positioning...

Comments  (1)

4c1c5119b03285e3f64bd83a8f9dfeec

On Cloud Outages (Yeah, They Happen)

August 29, 2012 Added by:Ben Kepes

Cloud vendors are quick to point out how reliable their data centers are with redundant channels, power supply structures and the like. Any application running on the cloud needs to consider the same issues – it is unrealistic to rely on one single data center – a chain is only as strong as its weakest link...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Threat Intelligence: Plenty Out There, But Are You an Analyst?

August 27, 2012 Added by:Infosec Island Admin

As the complexity of attacks grow at a rate outstripping the pace of Moores Law, defenders have to take up a more nuanced approach to protecting their environments. Reliance on technical solutions alone is not tenable, you have to look at the creature behind the keyboard to get a better picture of the attack...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Throwing Stones in Glass Houses: Views on the Security Industry

August 26, 2012 Added by:Rafal Los

The Information Security industry is rife with negativity. Why are we so quick to pile on to others' pain? Isn the security community just more cynical by nature, is it psychological? Are we wired this way? As an industry, our goal is to create more resilient, more secure' and more defensible postures for everyone...

Comments  (1)

B8db824b8b275afb1f4160f03cd3f733

Marketing to the Cynical, Skeptical, and Jaded

August 24, 2012 Added by:Jack Daniel

Words like engagement and community are overused by charlatans, marketing gurus, and social media experts- but if you cut the crap and actually engage the community, people will pay attention. Influencer is another abused term, but some people have more of a voice in the community than others. Ignoring people who aren’t ready to buy could be a very bad idea...

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Utilizing Network Security Solutions: A Customer’s Perspective

August 16, 2012

Anyone can go research IT companies and make decisions based solely on what they read, but this is not how people make decisions. People interested in buying a product or service want to know if it will work, how well it has worked in the past, and if current customers are happy with the product or service...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

The Future Ain’t Homogenized: Please Stop the FUD Vendors

August 15, 2012 Added by:Ben Kepes

At the end of the day, if is slightly cheaper to own your hardware than to rent, the fact is that if in doing so you have to spend time focusing on technology instead of focusing on your core business, then that savings pales into insignificance when compared to the real value that pure focus can bring...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

BlackHat 2012: Dwayne Melancon Key Takeaways

August 13, 2012

Melancon notes a key finding that “Hackers are always looking for outliers…and the key is to have a way to evaluate your systems and security posture continuously and be able to react pretty quickly.” What else can businesses learn from hackers? Check out this video to find out...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

What Information Security Can Learn from Waiting Tables

August 12, 2012 Added by:Robb Reck

What makes an organization effective is in knowing what their customer-base needs or wants. We are only as valuable as the service we give to our customers. For many of us, our primary customers are internal. The business leaders, the IT department, our vendors, and many others are the customers who are served...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Weakest Link in the Security Chain: Is it in Your Controls?

August 11, 2012 Added by:Tripwire Inc

Rather than brute-forcing the account, the hackers gained access by doing some creative social engineering by contacting Apple customer support. The problem is that we often turn over our data to 3rd-party providers without understanding what protocols they have in place to keep our data safe...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

State Sponsored Malware Takes Over Mars Rover

August 10, 2012 Added by:J. Oquendo

Many companies will omit many details and shift-slash-skew agendas to meet their concerns. Those concerns will ALWAYS be financial ones. At this point it is obvious that they and only they are capable of detecting the unseen, unheard of, undetectable, uberfilthware capable of infecting curiousity on Mars...

Comments  (1)

924ce315203c17e05d9e04b59648a942

Symantec Does Not Need Better Operations, It Needs Innovation

August 04, 2012 Added by:Richard Stiennon

The company dominates its market and any tweaks to operational efficiencies such as pairing down the product catalog, rationalizing SKUs, normalizing points given to distributors, and optimizing sales, R&D, marketing, and the executive office, will lead to greater profitability and stock performance...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »