Showing Blog Posts: 1–9 of 9 tagged Vendor

  • Security Innovation is Live and Well, With Plenty of Room for More

    by Fahmida Y. Rashid on March 24, 2015

    Is innovation in information security dead? It's easy to think so when each day there is a new headline about yet another massive organization's data breach, or a new report points out that enterprises aren't taking care of the security basics. All while cyber-attackers are gleefully scooping up our private data and looting our bank accounts. These breaches aren't happening because organizations…

  • Securosis Guide: IoWTF

    by Securosis Team on March 23, 2015

    This is the second post in a multi-part series about the Securosis Guide to the RSA Conference (RSAC-G). Please scroll to the bottom for links to other posts in the series. Have you heard a vendor tell you about their old product, which now protects the Internet of Things? No, it isn't a pull-up bar, it's an Iron Bar Crossfit (TM) Dominator! You should be mentally prepared for the Official RSA…

  • Securosis Guide: Change—Déjà Vu, All Over Again

    by Securosis Team on March 20, 2015

    This is the first post in a multi-part series about the Securosis Guide to the RSA Conference (RSAC-G). Please scroll to the bottom for links to other posts in the series. Every year we like to start the RSAC-G with a review of the major themes you will most likely see woven throughout presentations and marketing materials on the RSA Conference show floor. These themes are like channel surfing…

  • Welcome to the Securosis Guide to the RSA Conference

    by Securosis Team on March 19, 2015

    WAY back in 2010, we here at Securosis decided to put together a little guide to the RSA Conference. Sure, there’s the official conference schedule, session descriptions, show floor map, and heck, even an entire website, but we thought people would appreciate an actual hands-on guide with a little analysis. You know, things like key themes we expect to see, analysis of major security segments, …

  • Supply Chain Security: What It Means on a Global Level

    by John Linkous on July 18, 2014

    Take a good, long look at your smartphone. While there is a big vendor name on the outside, if you were to open up its case, you would find several other vendor labels on various components: capacitive touchscreens; video and audio ASICs; Bluetooth and WiFi hardware; and individual capacitors, resistors, and other electronics gear building blocks, to name just a few, all of which are manufactured…

  • Security Decisions: Changing the Way We Buy Security in the Enterprise

    by John Linkous on June 20, 2014

    When you hear the words "security product procurement," what's the first thing that pops into your head? Many enterprise customers who make security decisions for evaluating and purchasing technology often first think of the competitive landscape: How does one vendor's product compare to another? While this approach has been used since the dawn of commercial security products, there's a better…

  • Why Stories Reveal If You Can Trust the Security of Your Supply Chain

    by Michael Santarcangelo on May 21, 2014

    It's a conundrum. When working with the supply chain, secrecy is important. Sometimes, it's the difference between success and failure. However, when acquiring technology or working with partners, that secrecy could spell certain doom in the event of a problem. Worse, it often prevents the visibility into the process to conduct an appropriate evaluation. Can you trust the security across your…

  • Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

    by Ben Rothke on July 10, 2013

    Every organization has external software, hardware and 3 rd -party vendors they have to deal with. In many cases, these vendors will have direct access to the corporate networks, confidential and proprietary data and more. Often the software and hardware solutions are critical to the infrastructure and security of the organization. If the vendors don’t have effective information security and…

  • Assessing Vendors: A Hands-On Guide to Assessing Infosec & IT Vendors

    by Ben Rothke on May 30, 2013

    Even if your information security infrastructure is textbook perfect, you still can be at risk if the data being held by third-party vendors is not adequately secured. In Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors, author Josh More details a high-level overview of how to perform a vendor security analysis to ensure your vendors meet or exceed your security…

This document was retrieved from on Fri, 27 Mar 2015 07:55:37 -0400.
© 2015 EMC Corporation. All rights reserved.