Skip to content
SENKI
Surfing Internet Security & Resiliency as we thrive, heal, and grow in this life ….
  • Practical Security Guides, Projects, & Workbooks
    • DDoS Resiliency & Attack Preparation Workbook
      • DDoS Resiliency Workshop – 2022
      • DDoS Extortionist’s Behaviors
      • Operator’s Security & Resiliency Toolkit
      • Expected DoS Attacks – 10 Steps to Prepare for the Pain
      • 7 Habits of Highly Effective Cyber-Criminals
      • BGP Route Hijack – What can be done Today?
      • Preparing for DOS Attacks – the Essentials
        • Remote Triggered Black Hole (RTBH) Filtering
        • Monitoring Your Network for Malware, SPAM, BOTNET, and other Infections
        • Study Materials for Operational Security and DOS Defense
          • US’s National Strategy to Secure Cyberspace (2003)
        • SLA as a Security Tool
        • Remediating Violated Customers
        • Open Source Threat Intelligence Feeds
      • The History of DDoS and DoS
    • Network Operations & Scaling
      • Operator’s Security Toolkit – Main Page
        • The Service Provider Security “Bootcamp”
          • June 2014 Workshop Slides
          • Indonesia SP Workshops
          • CommunicAsia 2015
          • APRICOT 2012 Network Security Workshop
          • June 2014 Workshop Slides
          • Telecoms Security Workshop 2012
          • MAAWG 2012 Security Workshop
      • ISP Workshop Program
        • ITU Africa Telecom 98 IXP Demonstration
        • Singapore Internet Backbone (SIB)
      • Public Cloud DNS Resolvers (which offer services)
      • DNS Latency and Performance Test Tools
      • Network Operations Groups (NOGs)
    • Vendor Security
      • Meaningful Security Conversations with your Vendors
      • IoT Security Standards & Frameworks
    • Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers
  • Empowerment
    • Leveraging Credit Cards – Principles that Maximize Gain while Preventing Pain
    • Effective Linkedin Connections – Building Your Network
    • Building and Investing in a Community of “Contacts”
    • Best Principles for Using Linkedin for Social Selling
    • Programs that Empower Women Engineers
  • About Senki
    • Conference Talks, Workshops, and Webinars
    • Stay Connected with Senki’s Updates
    • Barry’s BIO
      • What Drives Barry?
      • Influential Reading List
    • I’ve got an exciting opportunity for you ….

Tag: secure code

Demand Security from your Vendors

Demand Security from your Vendors

Posted on January 11, 2016May 31, 2018

Demande Security from your Vendors. Ask the right “Security Questions.” This provides a list of questions that anyone can use with their vendors to get a better understanding of their security capabilities. Start meaningful “Security Conversations.” Read More

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to print (Opens in new window)

Like this:

Like Loading...

Categories

  • Conferences, Webinars, & Workshops
  • Cyberwar
  • DoD, DDoS, and Denial of Service
  • Empowering Humanity
  • Internet
  • Operator's Security Toolkit
  • Scaling
  • Security, Resiliency, and Scaling
  • Telecom
  • Threat Actors
  • Uncategorized
  • Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy
Theme by Out the Box
%d bloggers like this: