Blog Posts Tagged with "vendor"

69dafe8b58066478aea48f3d0f384820

Falconstor Software Conspired to Bribe Chase Executives

July 02, 2012 Added by:Headlines

The U.S. Attorney’s Office filed a criminal complaint against FalconStor Software, a data storage and protection company, alleging that the company conspired to pay more than $300,000 in bribes to executives of J.P. Morgan Chase Bank to obtain over $12 million in electronic storage licencing contracts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

VMware Confirms Older Hypervisor Source Code Exposed

April 27, 2012 Added by:Headlines

"Our security team became aware of the public posting of a single file from the VMware ESX source code and the possibility that more files may be posted in the future. The posted code and associated commentary dates to the 2003 to 2004 timeframe..."

Comments  (0)

296634767383f056e82787fcb3b94864

A History of Google's Government Sales

March 14, 2012 Added by:Jeffrey Carr

Every technology company sells to the government, and compared to Microsoft and Apple the google numbers are pretty low. But since Google is more intimate with our search habits and email content than anyone else, these statistics still make me a little uncomfortable...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

VoIP Vendor Ooma Outage: No DoS Attack Involved

August 18, 2011 Added by:Headlines

Customer services were interrupted by a power failure at the company's data center while their corporate website was simultaneously experiencing excessive traffic levels that was initially reported to have been caused by a denial of service (DoS) attack...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Thoughts on Software Security Assurance from a Like Mind

June 10, 2011 Added by:Rafal Los

Being able to tie exploitable issues in a running application to source code is the Holy Grail of security testing... but it's unlikely you'll get good adoption and success if you're trying to hand a bunch of developers black-box security testing technology...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Vendor Vulnerabilities: It's All About Reaction Time

June 03, 2011 Added by:Rafal Los

Holding a vendor accountable is understandable, since that is their primary business. There's really no excuse when a vendor of security products gets exploited or has a publicly disclosed exploit... well, sort of right? In the final analysis, what is it really all about?

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

How to Replace an Enterprise SIEM

May 18, 2011 Added by:Anton Chuvakin

Be prepared to keep the old SIEM running - without paying for the support contract, of course - or at least keep the old data backups – this becomes important if complete data migration is impossible due to architecture differences between the new and old SIEMs...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Qualys Receives Highest Rating in Gartner Report

May 04, 2011 Added by:Headlines

Qualys can deliver security and compliance in an integrated solution that easily interfaces with existing security solutions without the significant cost and complexity associated with deploying and maintaining traditional enterprise software...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Source Code is the New Hacker Currency

May 01, 2011 Added by:Rafal Los

The reason we're seeing security companies as a big, bright, shining target recently is that attackers finally realized they were sick of hitting each target individually - and wanted a way to hit millions of high-valued corporate safes all at once, potentially...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Washington DC Leads Cloud Trend Despite Security Concerns

April 26, 2011 Added by:Headlines

Security risks in the cloud have not prevented the federal government and the private sector from moving to cloud-based strategies which are able to provide a wider range of services at a lower price point than developing systems to accomplish the same tasks individually...

Comments  (0)

0c4ca84ec3f3f2d57194f8e0cbd5ba85

Advantages of Hosted Software and Data Security

April 14, 2011 Added by:Lindsay Walker

Every workplace has "super-users," people who can hack into systems and extract sensitive information. Having information stored offsite makes it challenging for anyone inside your organization to get their eyes on information they aren't permitted to see...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

She Blinded Me With Infosec...

April 11, 2011 Added by:Infosec Island Admin

One must admit that no matter how many times an assessment is carried out and things are found/exploited there are ALWAYS more vulnerabilities being introduced. You will never get them all and the client, if they understand this, will become inured to it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Data Centers Not Prepared for Disaster Recovery

March 31, 2011 Added by:Headlines

“When it comes to disaster recovery, the survey results are indicative of the investment activity we have seen in data centers throughout the recession—focus on immediate needs with business continuity and disaster recovery planning considered a luxury..."

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Security Vendors Vow to Defend Against Cyber-Boogeyman

March 21, 2011 Added by:J. Oquendo

McAfee is making a run to become the security industry's "Minitru". Regardless of my view of the security landscape, I believe that there is an increasing need to share information between companies that are under attack or that have been compromised. However, I doubt this could ever happen...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Get Back to Basics: Stuxnet and Aurora Lessons

February 24, 2011 Added by:Headlines

The plain fact is that most organizations are falling far short in protecting against the same threats that they've faced for the last 10 years. SQL injection, phishing, malicious attachments, social engineering. Old, every one of them. And yet, still incredibly effective at compromising networks in some of the best-known and theoretically best-protected companies.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Shoring Up National Cyber Security Infrastructure

February 21, 2011 Added by:Robert Siciliano

Corporations and government agencies are legally required to secure their systems. But no such standards exist for the consumer. No laws require you to take a single step for the sake of your own security. Software vendors should certainly be held accountable if their products aren’t secure...

Comments  (0)

Page « < 1 - 2 > »