1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Five rules to conduct a successful cybersecurity RFP

Discussion in 'CSO' started by RSS, Feb 1, 2016.

  1. RSS

    RSS New Member Member

    Last week was sadly remarkable for the cybersecurity industry: former New York city mayor Rudy Giuliani, compared cybersecurity to cancer, while famous security expert and journalist Brian Krebs pointed to serious problems at Norse Corporation, a prominent cybersecurity startup recently backed by KPMG VC investment of $11.4 million.

    Both events undermine trust in the cybersecurity industry and its players. I think it’s too early to speak about a cybersecurity bubble, however, it becomes more and more difficult to distinguish genuine security companies, with solid in-house technologies, and experts with flashy marketing and FUD (Fear, Uncertainty, Doubt) tactics. This makes the process of cybersecurity RFP (Request For Proposal) more complicated and challenging for organizations of all sizes.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page