Security Around Off The Shelf Softwares

IT Security consultants are very often asked to validate or scrutinize a ready to use software available in the market. Now, as everyone knows, not all softwares would be equally useful in each and every organization. Similarly, not all softwares would be equally secure in all organizations. Hence, here is a very useful and handy checklist for evaluating any off the shelf software.

An IT security expert’s checklist to buying commercial off-the-shelf software

Reduce Security Risk in Organizations

It is (and will always remain) an open debate around which are the most useful security steps to take.

Here is a very interesting article around the top 10 rules to always try and adhere to.

Pwn2Own Contest

To know more about this "one of its kind" hacking contest, go over my article in the April issue of the CH Magazine (on page 17).

http://chmag.in/issue/apr2010.pdf