Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Salary Sources for Security Professionals and Hiring Managers

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughMay 21, 2014Leave a comment

How much is a security professional worth annually? A number of factors go into this equation, but suffice it to say, the security industry and the salaries have not felt…

Details

Sandbox Vendors Ignore Microsoft Licensing Agreements

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonMay 16, 2014Leave a comment

An examination of Microsoft’s Customer License Agreement (CLA) for embedded systems indicates that there is no provision for a vendor to ship appliances with multiple virtual instances of Windows, or…

Details

Iranian Cyber Group Launches Spying Campaign Against US, FireEye Says

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidMay 13, 2014Leave a comment

An Iranian cyber-group has launched espionage campaigns using customized malware against United States defense companies, FireEye researchers said. The group, with the name Ajax Security Team, is behind an ongoing…

Details

FireEye Finally Makes a Good Acquisition

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonMay 9, 2014Leave a comment

This week FireEye announced both its quarterly results and the acquisition of nPulse, a network forensics tool. I was critical of FireEye’s Mandiant acquisition for one billion dollars mostly because…

Details

Mark Your Calendar: May 13 Greenwald To Post More Snowden Docs

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonMay 9, 2014Leave a comment

At the bottom of yesterday’s post on General Alexander’s extended interview with The Australian Financial Review, Glenn Greenwald appended: “The release date for my book on the NSA, privacy, and…

Details

Target CEO Ousted

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonMay 5, 2014Leave a comment

The list of top executives at Target who have been ousted because of the massive breach late last year has now extended to its President and CEO, Gregg Steinhafel. Target’s Chief…

Details

FireEye Warns Windows XP Users to Immediately Patch

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidMay 3, 2014Leave a comment

Windows XP users should immediately apply Microsoft’s out-of-band patch addressing the critical flaw in Internet Explorer because attackers are specifically targeting users on the older operating system, FireEye researchers warned.…

Details

Security Awareness of the Heartbleed Kind

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughMay 2, 2014Leave a comment

“Should I change my password?” “OK, I changed my password, now I’m secure, right?” Media reports over the past month certainly heightened security awareness and drove the public to sit…

Details

A Rise in Cyber Academies

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonMay 2, 2014Leave a comment

Academia is acquiring an interest in cyber education on many fronts. Not likely to crank out cyber warriors at anywhere close to the rate needed to meet current demand, they…

Details

Microsoft Releases Patch for Zero Day Flaw

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidMay 1, 2014Leave a comment

Microsoft released an out-of-band patch today for an Internet Explorer zero-day flaw, which was already being exploited in the wild. Surprisingly, Microsoft opted to release a patch for Windows XP,…

Details
←1
2345678910111213
…1415161718…
1920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}