Menu

Blogs

Showing Blog Posts: 1–10 of 11 tagged Vendor

  • Statistics Done Wrong: The Woefully Complete Guide

    by Ben Rothke on April 8, 2015

    It’s unclear who really said that “there are three kinds of lies: lies, damned lies, and statistics”. But the reality is that statistics are often misunderstood and misused. In Statistics Done Wrong: The Woefully Complete Guide, author Alex Reinhart, a statistics instructor and PhD student at Carnegie Mellon University, makes the case that most people, even those in the sciences, are misusing…

  • Securosis Guide: P.Compliance.90X

    by Securosis Team on March 27, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Compliance. It's a principle driver for security spending, and vendors know this. That's why each year compliance plays a major role in vendor messaging on the RSAC show floor. A plethora of companies claiming to be…

  • Security Innovation is Live and Well, With Plenty of Room for More

    by Fahmida Y. Rashid on March 24, 2015

    Is innovation in information security dead? It's easy to think so when each day there is a new headline about yet another massive organization's data breach, or a new report points out that enterprises aren't taking care of the security basics. All while cyber-attackers are gleefully scooping up our private data and looting our bank accounts. These breaches aren't happening because organizations…

  • Securosis Guide: IoWTF

    by Securosis Team on March 23, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Have you heard a vendor tell you about their old product, which now protects the Internet of Things? No, it isn't a pull-up bar, it's an Iron Bar Crossfit (TM) Dominator! You should be mentally prepared for the…

  • Securosis Guide: Change—Déjà Vu, All Over Again

    by Securosis Team on March 20, 2015

    This post is part of a multi-part series about the Securosis Guide to the RSA Conference (download the RSAC-G PDF). Please scroll to the bottom for links to other posts in the series. Every year we like to start the RSAC-G with a review of the major themes you will most likely see woven throughout presentations and marketing materials on the RSA Conference show floor. These themes are like channel…

  • Welcome to the Securosis Guide to the RSA Conference

    by Securosis Team on March 19, 2015

    WAY back in 2010, we here at Securosis decided to put together a little guide to the RSA Conference. Sure, there’s the official conference schedule, session descriptions, show floor map, and heck, even an entire website, but we thought people would appreciate an actual hands-on guide with a little analysis. You know, things like key themes we expect to see, analysis of major security segments, …

  • Supply Chain Security: What It Means on a Global Level

    by John Linkous on July 18, 2014

    Take a good, long look at your smartphone. While there is a big vendor name on the outside, if you were to open up its case, you would find several other vendor labels on various components: capacitive touchscreens; video and audio ASICs; Bluetooth and WiFi hardware; and individual capacitors, resistors, and other electronics gear building blocks, to name just a few, all of which are manufactured…

  • Security Decisions: Changing the Way We Buy Security in the Enterprise

    by John Linkous on June 20, 2014

    When you hear the words "security product procurement," what's the first thing that pops into your head? Many enterprise customers who make security decisions for evaluating and purchasing technology often first think of the competitive landscape: How does one vendor's product compare to another? While this approach has been used since the dawn of commercial security products, there's a better…

  • Why Stories Reveal If You Can Trust the Security of Your Supply Chain

    by Michael Santarcangelo on May 21, 2014

    It's a conundrum. When working with the supply chain, secrecy is important. Sometimes, it's the difference between success and failure. However, when acquiring technology or working with partners, that secrecy could spell certain doom in the event of a problem. Worse, it often prevents the visibility into the process to conduct an appropriate evaluation. Can you trust the security across your…

  • Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

    by Ben Rothke on July 10, 2013

    Every organization has external software, hardware and 3 rd -party vendors they have to deal with. In many cases, these vendors will have direct access to the corporate networks, confidential and proprietary data and more. Often the software and hardware solutions are critical to the infrastructure and security of the organization. If the vendors don’t have effective information security and…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 06 May 2015 14:32:15 -0400.
© 2015 EMC Corporation. All rights reserved.