vendors

Are You Too Reliant on Third-Party Vendors for Cybersecurity?
Protecting client data and company secrets requires vendor help and an expert IT team to monitor databases. ...
Security Boulevard

Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools
Tom Eston | | AI, AI Hype, Cyber Security, Cybersecurity, Cybersecurity Poverty Line, Data Privacy, Digital Privacy, Enhanced Security, Episodes, Information Security, Infosec, Matt Johansen, Podcast, Podcasts, Privacy, reddit, rsa, RSA Conference, San Francisco, security, technology, Vendor Hype, vendors, VulnerableU, Weekly Edition
In this first-ever in-person recording of Shared Security, Tom and Kevin, along with special guest Matt Johansen from Reddit, discuss their experience at the RSA conference in San Francisco, including their walk-through ...

The 2021 Security Outcomes report and better research methods
Something extraordinary happened recently in the Information Security research report area. Why I think it’s so extraordinary might have passed you by, unless you geek out on statistical methods in opinion polling ...

Sloppy patches are a breeding ground for zero-day exploits, says Google
Graham Cluley | | Featured Articles, patches, vendors, Vulnerability Management, zero-day exploits, Zero-day Vulnerability
Security researchers at Google have claimed that a quarter of all zero-day software exploits could have been avoided if more effort had been made by vendors when creating patches for vulnerabilities in ...

5 Indicators of Cyber Security Market Failure
6 Minute Read. By Simon Moffatt.Let us start with some brief definitions to get us all on the same page. Firstly – what is meant by the term “market failure”? A textbook ...
Thirty-four years in IT – System Administration, Backups, and Data Centers (Part 5)
As a side effect of building and running the backbone, I introduced UNIX systems into what was then a wholly VMS organization. We initially used Linux - roughly from 1994 - 1997, ...
The Challenges of Managing Third-Party Vendor Security Risk
It’s no longer enough to secure your own company’s infrastructure; you now must also evaluate the risk of third-party vendors and plan and monitor for breaches there, too. Data breaches are reported ...
A letter to our Apple Account Exec
A couple of days ago myself and a colleague of mine ran into our Apple account exec. The conversation ended up in the security space, as is probably appropriate considering Apples recent ...
Apple joins the big leagues
I've been hearing 'OS X is secure' for a decade now. For a decade, I've been challenging that assertion. The challenges to that assertion generally end up with a response of 'because ...

Oracle Support portal: HTML 5 replaces Flash
Oracle Support is upgrading their web interface from Flash to HTML5. I’m happy. I no longer have to twiddle my thumbs waiting for Flash to load:That was really annoying. The consolation prize ...