Social Engineering: Errors in Human Mind?

Author: Jens-Michael Marohn Social Engineering is a method to manipulate people into doing something or divulge confidential information. It could be seen as the hacking of the human mind. Compared to for example software, the human mind has far more vulnerabilities and it is significantly simpler to find and exploit these vulnerabilities since it does not require any special expertise like code or computer language. To become aware and protect ourselves against it, we need to look at the psychology and methods used by Social…

Keeping up in an Ever Extending Vendor Universe

Author: Tolga Yilmaz As companies evolve and their exponentially expanding requirements need to be satisfied, third parties and vendors come more and more into play. The reasons for this are justified, more than ever… as more companies become reliant on Information Technologies and Professional Services, they need to procure the best products, which requires in some instances deep knowledge of certain subjects. In some instances, some organizations have begun to outsource complete units as they primarily do not align with their subject matter expertise, and…

Is your Application Development Secure?

As companies more and more rely on more specific business applications in today’s fast paced business environment, the software development facilities serving the company have become a strategic partner. A partner that has become overwhelmingly occupied with projects so detailed and complex that it was just necessary to split up the project phases that developers can concentrate on their core duties… the code itself. So far so good, you have it all; your Project Management Office to coordinate the efforts and assign resources, Business Analysts…

Security As A Service: Do You Get the Service You Expected? (Part 2/2)

Following the first article about why organizations should outsource security services, in this post I would like to address some further considerations. Adding external IT service providers to your company’s IT service portfolio requires a lot more considerations and arrangements.  It is not the intension of this article to be comprehensive in this regards, because many aspects are outside the information security scope.   Therefore the below covers just a few more but important action items when searching for a new security service provider.

Security As A Service: Do You Get the Service You Expected? (Part 1/2)

This article takes you on a comprehensive tour de force of Managed Security Services (MSS). Learn why organizations outsource security services, how they select providers, how the two sides work together and where the pitfalls are even when all necessary steps were taken to ensure a successful project/service.

Copyright 2016 21st CENTURY IT · RSS Feed · Anmelden