New & Notable
Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions News
September 05, 2014
News roundup: The recent Goodwill security breach has been blamed on a third-party service provider, highlighting the need for due diligence. Plus: Mobile device theft; Android app vulnerabilities and a 12-year-long cyber-espionage network.
August 08, 2014
At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.
April 11, 2014
FireEye and Palo Alto Networks take issue with the new NSS Labs report on breach-detection systems, calling the review process into question.
March 28, 2014
Security vendors had money to spend in March as acquisition activity featured Trustwave scooping up Cenzic and Palo Alto's purchase of Cyvera.
Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Get Started
Bring yourself up to speed with our introductory content
EAL4 certification ensures integrity in security products, but is it a must when buying enterprise firewall products? Expert Brad Casey explains. Continue Reading
When IT professionals, such as you, have an IT project at their organization, there is a need to research multiple pieces of content from a variety of sources including vendors, third-parties and experts. This survey will allow TechTarget to ... Continue Reading
Financial institutions face numerous regulatory requirements for managing vendor risk. Learn what financial firms need to include in their vendor contracts in order to conform with regulatory guidance and industry best practices for vendor risk ... Continue Reading
Evaluate Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Uncover how domain security services can help enterprises monitor, lock and secure their domains to prevent cyberattacks. Continue Reading
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements. Continue Reading
At B-Sides San Francisco, Dan Kaminsky discussed how society inhibits its own security culture, and the need to look beyond status-quo technology. Continue Reading
Manage Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions
Learn to apply best practices and optimize your operations.
At the inaugural TrustyCon event, F-Secure's Mikko Hypponen decried the lack of trust in security vendors like RSA and warned of government malware. Continue Reading
Is network management outsourcing the future of network security or too great a risk? Matthew Pascucci discusses the risks and rewards. Continue Reading
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take. Continue Reading
Problem Solve Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
For enterprises that need to weigh security requirements versus vendors' claims, a vendor security checklist can help. Expert Joe Granneman advises. Continue Reading
Expert Joe Granneman weighs in on the value of market revenue rankings when it comes to choosing security software. Continue Reading
Mike Rothman offers 10 critical questions to ask antimalware vendors when seeking out the best antimalware products for enterprise use. Continue Reading