Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Treasury Secretary Says Financial Firms Need to Do More to Fight Cybersecurity Threats

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 16, 2014Leave a comment

Financial firms need to do more to fight cybersecurity threats, Treasury Secretary Jacob Lew told attendees at a financial conference on Tuesday. Lew spoke at the 2014 Delivering Alpha conference…

Details

TrapX Researchers Discover Attack Embedded in Logistics Devices

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJuly 16, 2014Leave a comment

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…

Details

Attackers Target Hotel Business Center Computers

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 15, 2014Leave a comment

Attackers are increasingly targeting computers in hotel business centers to steal sensitive information, the US Secret Service has warned. A law enforcement task force arrested members of a criminal gang…

Details

Votiro Neutralizes Zero-Day Malware Embedded in Files to Thwart Attacks

Linda Musthaler

Managing Editor

Security Current

Archived ArticlesBy Linda MusthalerJuly 14, 2014Leave a comment

Attackers know that if they want to compromise an organization an email with a malicious link or attachment is often the path of least resistance. Armed with a wealth of…

Details

Started by Teenager, Anti-Malware Startup Malwarebytes, Raises $30 Million in Series A Funding

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesJuly 11, 2014Leave a comment

Malwarebytes, started ten years ago by then 14-year-old Marcin Kleczynski, has raised $30 million in its first round of funding, the anti-malware company announced on Thursday. The company said the…

Details

Security Culture – It’s a Business Decision

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughJuly 10, 2014Leave a comment

Everyday businesses make decisions. The saying, “it’s a business decision,” is loathed by some in the security industry and largely because security was not involved in the decision. Many of…

Details

Getting your AppSec program ready for DevOps

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleJuly 10, 2014Leave a comment

You know the illustration The March of Progress?  The name itself might not ring a bell for everyone, but more than likely you’ve seen it: it’s the illustration showing human…

Details

Wall Street Is Worried About Tom Clancy Scenario

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJuly 9, 2014Leave a comment

The Securities Industry and Financial Markets Association (SIFMA), an industry trade group for banks securities firms and asset managers, is worried about catastrophic attacks against their members, Bloomberg reported today. Bloomberg…

Details

Senate Intelligence Committee Approves Cybersecurity Bill

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 9, 2014Leave a comment

The Senate Intelligence Committee approved a cybersecurity bill on Tuesday which is intended to help companies and government agencies defend against cyber-attackers. The Cybersecurity Information Sharing Act would make it…

Details

Is there Another NSA Leaker? Updated

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJuly 3, 2014Leave a comment

This morning a partial analysis of the NSA’s XKEYSCORE code was published in Germany. Jacob Applebaum, an evangelist for the The Onion Project (TOR), was one of the authors. The…

Details
←1
23456789
…1011121314…
151617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}