How to audit external service providers
News of or firsthand experience with breaches that attackers managed to achieve using external service providers such as POS vendors reminds enterprises that the federated enterprise makes a bulletproof perimeter no longer possible.Failure to audit your providers is like neglecting to audit your internal enterprise, culminating in similar ramifications. In both cases, you can’t close holes you don’t know exist. But knowing what to audit can be the lion’s share of how to get it done right.In this fourth installment of a five part series designed to harden and remove vulnerabilities in incident response itself, CSO tips you off on what to audit inside those who conduct trade so closely with you and what resources to use.To read this article in full or to leave a comment, please click here(Insider Story)

Nothosauraus promises to be an open source heavyweight.
It’s all about on-demand Ethernet services.
Download now to learn the latest on the NFV Infrastructure and MANO.
Microservices pro tip: In space war, don't set your ships' health to zero.