Blogs

Showing Blog Posts: 1–5 of 5 tagged Vendor

  • Supply Chain Security: What It Means on a Global Level

    by John Linkous on July 18, 2014

    Take a good, long look at your smartphone. While there is a big vendor name on the outside, if you were to open up its case, you would find several other vendor labels on various components: capacitive touchscreens; video and audio ASICs; Bluetooth and WiFi hardware; and individual capacitors, resistors, and other electronics gear building blocks, to name just a few, all of which are manufactured…

  • Security Decisions: Changing the Way We Buy Security in the Enterprise

    by John Linkous on June 20, 2014

    When you hear the words "security product procurement," what's the first thing that pops into your head? Many enterprise customers who make security decisions for evaluating and purchasing technology often first think of the competitive landscape: How does one vendor's product compare to another? While this approach has been used since the dawn of commercial security products, there's a better…

  • Why Stories Reveal If You Can Trust the Security of Your Supply Chain

    by Michael Santarcangelo on May 21, 2014

    It's a conundrum. When working with the supply chain, secrecy is important. Sometimes, it's the difference between success and failure. However, when acquiring technology or working with partners, that secrecy could spell certain doom in the event of a problem. Worse, it often prevents the visibility into the process to conduct an appropriate evaluation. Can you trust the security across your…

  • Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

    by Ben Rothke on July 10, 2013

    Every organization has external software, hardware and 3 rd -party vendors they have to deal with. In many cases, these vendors will have direct access to the corporate networks, confidential and proprietary data and more. Often the software and hardware solutions are critical to the infrastructure and security of the organization. If the vendors don’t have effective information security and…

  • Assessing Vendors: A Hands-On Guide to Assessing Infosec & IT Vendors

    by Ben Rothke on May 30, 2013

    Even if your information security infrastructure is textbook perfect, you still can be at risk if the data being held by third-party vendors is not adequately secured. In Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors, author Josh More details a high-level overview of how to perform a vendor security analysis to ensure your vendors meet or exceed your security…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 24 Oct 2014 09:29:01 -0400.
© 2014 EMC Corporation. All rights reserved.