<img alt="dcsimg" id="dcsimg" width="1" height="1" src="//www.qsstats.com/dcsuuvfw300000gkyg9tnx0uc_3f7v/njs.gif?dcsuri=/index.php/c/a/Security/Black-Hat-2010-10-Security-Hotspots-for-CIOs-to-Watch-568046/4&amp;WT.js=No&amp;WT.tv=10.4.1&amp;dcssip=www.cioinsight.com&amp;WT.qs_dlk=XOXbZXNRQ2aPacEMzIkISQAAAA8&amp;">

Collaboration Carries Exploit Potential

By Sean Martin  |  Posted 08-10-2010 Print

Information sharing and collaboration will always bring with it defects that lead to vulnerabilities, which lead to exploits, and, ultimately, to successful attacks. The real question is whether more can be done from a vendor perspective to reduce the risk exposure of these exploits, including minimizing the sale of exploits on the black market.

The CIO or CSO needs establish strong relationships with security researchers and vendors. A relationship with the research community can help a CIO understand risks within a specific environment. A relationship with the vendor community helps keep the vendors grounded in the business realities of building secure solutions. A great way for the CIO/CSO to stay connected with the security community is to participate in some of the leading security groups. Here are two worth considering:


Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.