Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Google Blocks Access to Confidential Goldman Sachs Email Mistakenly Sent to Gmail

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 3, 2014Leave a comment

Google has blocked access to a confidential Goldman Sachs email that was sent by mistake to a Gmail address. The financial company is now seeking a second court order to…

Details

Do Increasing Worries About Insider Threats Mean it is Time to Take Another Look at DRM?

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyJuly 3, 2014Leave a comment

The encryption vendor SafeNet publishes a Breach Level Index that records actual reported incidents of data loss. Whilst the number of losses attributed to malicious outsiders (58%) exceeds those attributed…

Details

FISMA Reform Bill Heads to Senate

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 1, 2014Leave a comment

The Senate Homeland Security and Governmental Affairs Committee approved a new bill intended to strengthen the Federal Information Security Management Act on June 25. The bill heads to the Senate…

Details

PayPal Apparently Enforcing Non-existent Laws

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJuly 1, 2014Leave a comment

According to one of the founders of ProtonMail, a secure email startup, PayPal had suspended their account. A PayPal representative reportedly questioned the legality of an encrypted email solution. ProtonMail…

Details

Are Former Government Cyber Experts Worth Their Consulting Fees?

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJune 30, 2014Leave a comment

Congressman Alan Grayson made waves last week when he sent letters to the Securities Industry and Financial Markets Association(SIFMA), the Consumer Bankers Association, and the Financial Services Roundtable assailing former…

Details

Florida Governor Signs Nation’s Toughest Data Breach Law

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJune 26, 2014Leave a comment

Florida Governor Rick Scott signed into a law what may be the nation’s broadest and stringent data breach law. The Florida Information Protection of 2014, which was signed last week,…

Details

Various Email Security Solutions Post Snowden

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJune 25, 2014Leave a comment

As predicted (by me) email encryption solutions are proliferating rapidly. All it took was a threat actor to appear on the scene. The first time I met Mark Rasch we…

Details

Microsoft Releases Preview of Interflow Info Exchange Platform

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJune 23, 2014Leave a comment

Microsoft launched a preview of a new security and threat information exchange platform to allow security professionals to share information about ongoing threats. Called Interflow, Microsoft’s threat sharing platform will…

Details

NATO Should Stand Down From Apocalyptic Cyber Fears

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJune 20, 2014Leave a comment

Tallinn 2007 was indeed a wake up call for NATO.  The massive amounts of distributed denial of service (DDoS) attacks against websites, communications, and even Estonian Parliament members’ fax machines, arising…

Details

Managing Third-Party Relationships

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughJune 19, 2014Leave a comment

Third-parties are an expansion of the corporate network. They’re a necessity providing a range of services which are better off outsourced than to try and do in-house. Often-times third-parties are…

Details
←1
2345678910
…1112131415…
1617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}