Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

NetScout’s Great Blunder: Suing Gartner

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonAugust 11, 2014Leave a comment

NetScout, a vendor of network management tools, has filed a suit against Gartner claiming that Gartner has a “pay-to-play” business model. The suit states that Gartner made false and defamatory statements regarding NetScout,…

Details

Black Hat at a Glance

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidAugust 8, 2014Leave a comment

In its 17th year, the annual Black Hat security conference was bigger than ever, with more than 8,000 registered attendees, 147 vendors exhibiting in the expo hall, and more workshops.…

Details

Is Russia Poised to Retaliate Against Sanctions With Cyber Attacks?

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonAugust 7, 2014Leave a comment

Way last April, a time when the world seemed a more peaceful place, Leon Panetta and Richard Clarke were quoted warning of impending Russian cyber attacks in the wake of…

Details

NSF Cybersecurity Ideas Lab: Some Ideas Worth Considering

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonAugust 3, 2014Leave a comment

This past February I participated in an amazing three day innovation and ideation lab pulled together by Farnam Jahanian, Assistant Director, Directorate for Computer and Information Science and Engineering, National…

Details

General (Ret.) Keith Alexander Pivoting to the Enterprise

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJuly 31, 2014Leave a comment

According to a report in Foreign Policy, former NSA head Keith Alexander has ideas. Ideas he wants to patent and turn into a business.  Admittedly, Alexander has had exposure to…

Details

The House Committee on Homeland Security Passes Three Cybersecurity Bills

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 29, 2014Leave a comment

The House Committee on Homeland Security passed three cybersecurity bills with broad bipartisan support on Monday. The Critical Infrastructure Research and Development Advancement Act of 2013 amends the Homeland Security…

Details

Announcing the Marriage of the IT Security Office and the Network Management Group

Randy Marchany

CISO

Virginia Tech

Archived ArticlesBy Randy MarchanyJuly 24, 2014Leave a comment

Ok, maybe it’s not a marriage but more along the lines of living together. In a previous article, I spoke about moving to a Continuous Monitoring security model, which focuses on…

Details

Six Indictments in $1.6M StubHub Cybertheft Case

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 23, 2014Leave a comment

Six people were indicted on Wednesday as part of an international ring of cyber-criminals that hijacked over 1,000 StubHub accounts and defrauded the ticketing service of approximately $1.6 million, the Manhattan…

Details

Cybercriminals Successfully Bypass Two-factor Authentication at some European Banks

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 22, 2014Leave a comment

Cybercriminals are successfully bypassing two-factor authentication systems at some European banks and transferring funds out of victim accounts, Trend Micro said. The sophisticated attack campaign uses malicious email attachments, phishing…

Details

The Security and Visibility of Critical National Infrastructure: ViaSat’s Mega-SIEM

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyJuly 17, 2014Leave a comment

There has been plenty of talk about the threat of cyber-attacks on critical national infrastructure (CNI). So what’s the risk, what’s involved in protecting CNI and why, to date, do…

Details
←1
2345678
…910111213…
14151617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}