Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Salesforce Under Cyber Attack; Issues Malware Warning

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidSeptember 11, 2014Leave a comment

Attackers are targeting Salesforce users with malicious emails designed to trick victims into downloading the Dyreza malware onto their computers, the software-as-a-service giant warned customers earlier this week. Salesforce said…

Details

Up to 5 Million Gmail Passwords Posted on a Russian Bitcoin Forum

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidSeptember 11, 2014Leave a comment

Up to 5 million passwords for Gmail accounts were posted on a Russian Bitcoin forum on Wednesday. As security incidents go, the password dump is a non-event, as the list…

Details

5 Strategies to Combat Shadow IT

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleSeptember 11, 2014Leave a comment

In today’s businesses, it seems like the technology landscape is changing ever more rapidly. For most firms, IT has become a veritable parade of transformative and disruptive technology: cloud, mobility,…

Details

Cloud Data Security – Control, Privacy, Trust

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughSeptember 4, 2014Leave a comment

The latest iCloud photo leak news makes for interesting conversation – both with friends and family as well as business leaders. Yet not surprisingly, many are entrusting their digital lives…

Details

Home Depot Continues Investigation Into Reported Breach

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidSeptember 4, 2014Leave a comment

Home improvement retailer Home Depot is still investigating a possible breach where cyber-criminals may have stolen credit and debit card details from nearly all of its 2,200 stores in the…

Details

Veritas Capital Agrees to Acquire BeyondTrust for $310 Million

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesSeptember 3, 2014Leave a comment

Veritas Capital, the New-York-based private-equity, firm has agreed to buy BeyondTrust Software Inc., a provider of privileged account management and vulnerability management solutions, a statement by the security vendor said. Bloomberg reported…

Details

IEEE Launches Center for Secure Design with Google, Twitter, Harvard and Others

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidSeptember 3, 2014Leave a comment

Google, Twitter, and HP are teaming up with 10 other technology companies and universities to help developers design secure software and write better code. An initiative under the Institute of…

Details

Web Security 3.0 – Is Your Business Ready?

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeySeptember 3, 2014Leave a comment

Security products have evolved with the use of the Internet. When web sites were largely static it was enough to tell users which URLs to avoid because the content was…

Details

Global Border Gateway Protocol (BGP) IP Tables Peak Past 512K

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonAugust 13, 2014Leave a comment

We all knew it was coming. As more and more networks are created and the IP address space is subdivided more and more the global routing table that backbone routers…

Details

LinkedIn Scammer Techniques Are Getting Scary

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonAugust 12, 2014Leave a comment

This is an update to the article  about identifying LinkedIn scammers when they request a connection. In that article we listed six ways to identify fake accounts: 1.Look at that URL.…

Details
←1
234567
…89101112…
1314151617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}