Items Tagged with "vendors"


7c5c876d1933023ac375eead04302e1a

Blackhat, BSidesLV and DefCon Oh My... 2012 Edition

August 01, 2012 Added by:Boris Sverdlik

The upside for being in Vegas for BlackHat is that BSidesLV runs concurrently. BSides always tend to be much better events. The attendees are rarely the vendor mouthpiece types and this alone makes the conference enjoyable. I had attended more talks at BSides than I have at other conferences combined this year....

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Don’t Freak Out, It was Only DefCon

July 31, 2012 Added by:Brent Huston

Disregard tales of drunken hackers menacing Vegas hotels, changing signs and doing social engineering attacks. They are good for amusement and awareness, but they are NOT really useful as a lens for viewing your organization’s risk or the steps you should be taking to protect your data. Instead, stick to the basics...

Comments  (1)

4c1c5119b03285e3f64bd83a8f9dfeec

Technical Considerations when Moving to the Cloud

July 29, 2012 Added by:Ben Kepes

When faced by sometimes rabidly optimistic vendors that suggest putting everything into the cloud, right away, organizations are naturally a little confused when it comes to deciding what applications to move and how to develop an incremental migration strategy...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

GSA Seeks Cloud Brokerage Information

July 28, 2012 Added by:Kevin L. Jackson

The objective of this RFI is to learn more about how government can further leverage the key characteristics and advantages of cloud computing to save money and increase IT efficiencies. CSB's are one concept that GSA is exploring and this RFI contains questions specific to cloud brokerages...

Comments  (0)

812d096e189ecbac061ebfe343f91e1e

To “Open Source” or “Not to Open Source”

July 27, 2012 Added by:Andrew Sanicola

Many open source products have add-ons, extensions, plug-ins etc. which make them attractive. While the core application itself is mostly secure, it is these extensions and plug-ins contributed by many diverse developers and organizations that introduce vulnerabilities into the open source product as a whole...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Companies That Give Back with Free Tools

July 25, 2012 Added by:Rob Fuller

Penetration Testing / Red Teaming requires the use of a lot of tools. I don't mind getting called a "script kiddie" because I can accomplish more and faster when I don't have to code every single task I need to do. This post is to point out companies that make this possible and give a small bit of thanks...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

Security Slide Rules - The Video...

July 24, 2012

I read this blog post on Slide Rules by Wendy Nather and immediately dropped her a note asking for permission to convert it into a video. After a huge battle with 20th Century Fox over rights to film I won... well at least that’s how I imagine it to have happened...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

UP and to the RIGHT: Strategy and Tactics of Analyst Influence

July 23, 2012 Added by:Ben Rothke

If up and to the right is the desired Magic Quadrant location, how does one get there? For many tech firms, they often are clueless. In this book, Stiennon provides clear direction. For those looking to make the expedition to the land of Gartner, this book is a veritable Berlitz Guide on how to make the journey...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Cloud Surveys and Extrapolating Out to Disruption

July 11, 2012 Added by:Ben Kepes

NBVP had around 40 industry collaborators survey close to 800 respondents to ascertain their key issues impacting cloud computing. Security remains the primary inhibitor to adoption with 55% of respondents identifying it as a concern, followed by regulatory compliance at 38% and vendor lock-in at 32%...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Leap Second, Public Cloud and a Lesson in Enterprise Resiliency

July 06, 2012 Added by:Rafal Los

Everything in life will fail at some point - it is a smart thing to plan for and architect into your applications or services. Undoubtedly this type of strategy costs more - having multiple providers, more complex software, more data shipping and redundancy isn't cheap - but this is one lesson you must learn...

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Nonsense Abounds, and More is Coming...

July 05, 2012 Added by:Jack Daniel

You cannot “stop attacks”, you can only alter the consequences of the attacks. You can stop attacks from succeeding sometimes, and minimize the impact on your organization, but the attacks will come no matter what. Further, the idea that “attacks” only fall into two categories, zero-day and patchable, is more nonsense...

Comments  (1)

F2792196079f2c16cd02be6e9ff5b3da

Why Open Source is Not Always the Best Bet

July 02, 2012 Added by:DHANANJAY ROKDE

Although open source software appears fantastic at the outset, they often come with an indirect price to pay, and it takes a lot of time for the organization to realize this. If your organization is hit by the ‘using open source to reduce costs’ wave, here are a few points you to look at before taking the leap...

Comments  (1)

Ebe141392ea3ebf96ba918c780ea1ebe

Security Slide Rules

June 29, 2012 Added by:Wendy Nather

First off, there must be a slide talking about The Problem We All Face and that it’s a scary, scary world out there, otherwise I would forget why we’re all here. Next, there must be a slide that includes icons of people, the cloudernet, and either monitors or CPUs. Extra points for creatively drawn bad guys...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Myth or Fact? Debunking the Biggest Information Security Myths

June 27, 2012 Added by:Tripwire Inc

Myths have existed throughout history in different cultures and times. The information security industry isn’t excluded from having its own share of myths. So, I got in touch with some European security professionals to share their views on some of the biggest security myths that need busting...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud: To Rent or Buy Your Cloud?

June 27, 2012 Added by:Rafal Los

One cloud does not fit all. Your cloud should be customized to fit your business. I believe that if you're going to have a cloud strategy you need to have a pragmatic approach which has you doing your due diligence, proper risk analysis, and understanding your cloud vendor...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Underground Financial Networks

June 26, 2012 Added by:gaToMaLo r. amores

Greendot and other Reloadable debit cards are not a safe means of conducting anonymous financial transfer. The financial networks created by these cards are very prone to network analysis. There is an unacceptable amount of cross network contamination for vendors...

Comments  (4)

Page « < 1 - 2 - 3 - 4 - 5 > »