Skip to content
  • OUR EXPERTS
  • OUR WORKSHOPS
  • OUR MAGAZINE
  • ABOUT
  • CISOs Connect Login
2023 2024 Top Bar Menu
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current
  • CISO Spotlights
  • CISO Blogs
  • Vendor Spotlights
  • Events
    • CISOs Connect™ Miami 2023
  • Awards
    • CISO Choice Awards 2023
    • CISO Choice Awards 2022 Winners
    • Congratulations to the 2023 CISOs Top 100 CISOs (C100) Winners
    • Congratulations to the 2022 C100 Winners
  • Videocasts
  • CISO Spotlights
  • CISO Blogs
  • Vendor Spotlights
  • Events
    • CISOs Connect™ Miami 2023
  • Awards
    • CISO Choice Awards 2023
    • CISO Choice Awards 2022 Winners
    • Congratulations to the 2023 CISOs Top 100 CISOs (C100) Winners
    • Congratulations to the 2022 C100 Winners
  • Videocasts

Archived Articles

Is there Another NSA Leaker? Updated

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJuly 3, 2014Leave a comment

This morning a partial analysis of the NSA’s XKEYSCORE code was published in Germany. Jacob Applebaum, an evangelist for the The Onion Project (TOR), was one of the authors. The…

Details

Google Blocks Access to Confidential Goldman Sachs Email Mistakenly Sent to Gmail

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 3, 2014Leave a comment

Google has blocked access to a confidential Goldman Sachs email that was sent by mistake to a Gmail address. The financial company is now seeking a second court order to…

Details

Do Increasing Worries About Insider Threats Mean it is Time to Take Another Look at DRM?

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyJuly 3, 2014Leave a comment

The encryption vendor SafeNet publishes a Breach Level Index that records actual reported incidents of data loss. Whilst the number of losses attributed to malicious outsiders (58%) exceeds those attributed…

Details

FISMA Reform Bill Heads to Senate

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJuly 1, 2014Leave a comment

The Senate Homeland Security and Governmental Affairs Committee approved a new bill intended to strengthen the Federal Information Security Management Act on June 25. The bill heads to the Senate…

Details

PayPal Apparently Enforcing Non-existent Laws

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJuly 1, 2014Leave a comment

According to one of the founders of ProtonMail, a secure email startup, PayPal had suspended their account. A PayPal representative reportedly questioned the legality of an encrypted email solution. ProtonMail…

Details

Are Former Government Cyber Experts Worth Their Consulting Fees?

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJune 30, 2014Leave a comment

Congressman Alan Grayson made waves last week when he sent letters to the Securities Industry and Financial Markets Association(SIFMA), the Consumer Bankers Association, and the Financial Services Roundtable assailing former…

Details

Florida Governor Signs Nation’s Toughest Data Breach Law

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJune 26, 2014Leave a comment

Florida Governor Rick Scott signed into a law what may be the nation’s broadest and stringent data breach law. The Florida Information Protection of 2014, which was signed last week,…

Details

Various Email Security Solutions Post Snowden

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJune 25, 2014Leave a comment

As predicted (by me) email encryption solutions are proliferating rapidly. All it took was a threat actor to appear on the scene. The first time I met Mark Rasch we…

Details

Microsoft Releases Preview of Interflow Info Exchange Platform

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJune 23, 2014Leave a comment

Microsoft launched a preview of a new security and threat information exchange platform to allow security professionals to share information about ongoing threats. Called Interflow, Microsoft’s threat sharing platform will…

Details

NATO Should Stand Down From Apocalyptic Cyber Fears

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJune 20, 2014Leave a comment

Tallinn 2007 was indeed a wake up call for NATO.  The massive amounts of distributed denial of service (DDoS) attacks against websites, communications, and even Estonian Parliament members’ fax machines, arising…

Details
←1
2345678910
…1112131415…
1617181920212223242526272829303132
33→
© Security Current 2023. All rights reserved.
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}