Best practices in approaching vendor risk assessment

Best practices in approaching vendor risk assessment


Best practices in approaching vendor risk assessment

Posted: 14 Oct 2010 10:00 AM PDT

When it comes to vendor risk assessment, a one-size-fits-all approach is not the way to go. Every vendor you bring into your organization will add its own unique set of risks and vulnerabilities, an...

Android SMS Trojan variant targets Russian users

Posted: 14 Oct 2010 08:17 AM PDT

It worked for the first two times, why wouldn't it a for third? It's likely that the same scammers who were behind the previously discovered Android Trojan variants (1,2) secretly sending text mes...

How to become a published author in information security

Posted: 14 Oct 2010 07:01 AM PDT

A large security event is always filled with exceptionally clever attendees who are writers in one way or another. Some produce training materials for their employers, others write whitepapers or ar...

The value of your credentials

Posted: 14 Oct 2010 07:00 AM PDT

As surprising as this may sound, earlier this year stolen twitter credentials were valued at almost $1,000. When compared to credit card details that fetch less than $1, why do twitter credentials com...

Photos: RSA Conference Europe 2010

Posted: 14 Oct 2010 05:31 AM PDT

RSA Conference Europe 2010 at a glance: keynotes, presentations, mingling on the expo floor. ...

Microsoft's Network compromised, used to route traffic to spam websites

Posted: 14 Oct 2010 04:46 AM PDT

Microsoft has confirmed that two network devices on its network have indeed been compromised and were being used by criminals to route traffic to more than a thousand websites used to push fake pills.

How to sell security to senior management

Posted: 14 Oct 2010 04:01 AM PDT

While companies know they have to invest in IT to do their jobs, IT security always ends up looking like an added cost in the eyes of the management. So, what are the things you need to learn about ...

Portable device management and protection for Mac users

Posted: 14 Oct 2010 02:10 AM PDT

Cososys has released Endpoint Protector 2009, a new version of its device management, endpoint security and data loss prevention solution for Mac/Apple computers. The newly introduced features are...

Dangers of wireless network use still unknown to many

Posted: 14 Oct 2010 01:35 AM PDT

Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a new study. In an 'ethical hacking' experiment conducted across six UK cities, nearly 40,000 networks were rev...

Agentless configuration auditing

Posted: 14 Oct 2010 12:42 AM PDT

nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically discovers configurations of mos...

0 comments:

Post a Comment