Access "Enforcing a vendor risk assessment to avoid outsourcing security risks"
This article is part of the March 2009 issue of Top considerations for midmarket security
As the economy worsens and corporate budgets tighten, there will be an increased pressure on CIOs and their staffs to use third-party service providers for various IT services. This will include everything from existing outsourcing of HR services, payment processing and CRM services to more cloud-based services such as Amazon Elastic Compute Cloud and Microsoft's Azure. Additionally, we will undoubtedly see an increase of privacy and security compliance regulations. Combine the increased flow of data outside the traditional corporate perimeter with the additional compliance needs, and the result is a much sharper focus on the security of third-party service providers. But how are CISOs supposed to verify the security of a service provider meets their needs to avoid outsourcing security risks? This isn't exactly a new problem, yet it's not one we've had a good solution for in part because it's such a moving target, especially in the case of many of the new cloud-based offerings that aren't built with security in mind. In the end, what a security manager needs... Access >>>
Premium Content for Free.
Five considerations for securing a midmarket company
Smaller organizations need to be more resourceful, and we'll explain how risk management, automation and managed security services, among others, can help.
Choosing the right Web application firewall
by Michael Cobb, Application Security
PCI DSS is requiring companies to buy Web application firewalls. We'll show how you how to pick the WAF that's right for you, and how to use it so your company is compliant -- and more secure.
Cloud computing security framework may ease security concerns
The Jericho Forum is expected to release a framework of security considerations for organizations moving business to the cloud.
- Five considerations for securing a midmarket company
How to Secure Cloud Computing
On-demand computing services can save large enterprises and small businesses a lot of money, but security and regulatory compliance become difficult.
How to secure use of Web 2.0
How much information is too much information, and how will you monitor and manage the use of Web 2.0 inside your organization?
- How to Secure Cloud Computing
Cybersecurity's profile rising under Obama
The Obama Administration is conducting a review of the government's cybersecurity policies and process. We should be encouraged that security could move beyond the useless paper exercise it is today
Enforcing a vendor risk assessment to avoid outsourcing security risks
by David Mortman, Contributor
As enterprises outsource more services and share data, they must be vigilant about the security of third parties.
Data classification best practices: Techniques, methods and projects
by Jay Heiser, Contributor
Effective data classification in the enterprise requires a simple approach.
- Cybersecurity's profile rising under Obama
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...