Blog Posts Tagged with "Third Party"


Social Networkers Blindly Joining ""

March 09, 2011 Added by:Headlines

Users are asked to allow the service's application to interface with their LinkedIn, Facebook, and Twitter accounts. According to Cluley's research, potentially thousands of people have already done so. The problem is, no one is entirely sure what is...

Comments  (0)


It Was Developed By A Third Party… Of Course It’s Secure!

March 01, 2011 Added by:Gary McCully

I recently participated in an Internal Attack and Penetration Assessment where I encountered a third party web application which contained various vulnerabilities. These vulnerabilities could be linked together in such a way that remote code execution on the underlying operating system was possible...

Comments  (0)


Security Risks: Betting With Other People's Money

February 11, 2011 Added by:Rafal Los

The company made a conscious decision, at the board level to stick its head in the sand. After doing some complex mathematical calculations and figuring out what a full-scale Software Security Assurance program would cost versus what it costs to pay fines and lawyers, they've decided on the latter...

Comments  (2)


Why the Cloud is a Security Nightmare

January 27, 2011 Added by:Dan Dieterle

Hackers will leverage the power of the cloud themselves to attack government and enterprise encrypted systems. Recently, it was shown that WPA encryption could be cracked using the computing power of the cloud...

Comments  (4)


SaaS: Accountability Can Get Lost - Not Liability

January 10, 2011 Added by:Robert Gezelter

Pay-as-you-go applications have undeniable allure. Pay-as-you-go providers have had a major impact, whether characterized as SaaS or ASP. They are now often seen as far more cost-effective means of providing applications than in-house hosting. Taken at face value, the savings seem irresistible...

Comments  (0)


Insider Threats at the Executive Level

December 20, 2010 Added by:Headlines

The insider threat is particularly troublesome for organizations, as the the perpetrators have access to the most confidential of information, and breach detection usually only occurs after the damage is done...

Comments  (0)


Thirteen Million deviantART Accounts Exposed

December 17, 2010 Added by:Headlines

The exposure was due to security lapses at Silverpop System, a marketing company that handles member communications for deviantART. The companies stated that no passwords were accessed, and that the biggest threat will be an influx of SPAM for the account holders exposed...

Comments  (0)


Amazon's WikiLeaks Ban Breeds Cloud Insecurity

December 15, 2010 Added by:Headlines

They played into the biggest fear that cloud critics have, and that’s the general sense of unease when your content is in another company’s control. If Amazon decides you aren’t playing by the rules, you could be in the penalty box and your business severely compromised...

Comments  (0)


How To Risk-Base Supply Chain Vendors Under FCPA

November 25, 2010 Added by:Thomas Fox

The Supply Chain probably does not command your Compliance Department attention as do other types of third party business partners. This may be coming to an end as most Compliance Professionals recognize that third parties which supply goods or services to a company should be scrutinized...

Comments  (1)

Page « < 1 - 2 - 3 > »