Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Verizon’s New Cyber Intelligence Center Offers Advanced Incident Response, Detection

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidMarch 5, 2014Leave a comment

Verizon Communications Enterprise Solutions last week launched a new Verizon Cyber Intelligence Center (VCIC) to offer organizations advanced incident response and detection capabilities. The VCIC will offer global organizations advanced…

Details

FIDO – Fast Identity Online: No More Dogs on the Internet

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyMarch 4, 2014Leave a comment

Web users rely on SSL (secure sockets layer) on a regular basis without having to know what it is or even if it is securing their transactions and data in…

Details

What Will A Russia-Ukraine Cyberwar Look Like?

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonMarch 3, 2014Leave a comment

Update March 4:  According to a Renysis Blog post from February 26 Ukraine has very resilient Internet connectivity not likely to be disrupted by a single event.  According to Reuters Tuesday Valentyn…

Details

Seculert Delivers Advanced Threat Protection as a Cloud-based Solution

Linda Musthaler

Managing Editor

Security Current

Archived ArticlesBy Linda MusthalerMarch 1, 2014Leave a comment

Two months since the news of the massive Target breach broke, reports are starting to reveal bits and pieces of how the perpetrators were able to get a foothold inside…

Details

Convergence of SIEM and Forensics

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyFebruary 26, 2014Leave a comment

Sometimes technology areas that once seem distinct converge. Indeed there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and…

Details

I Yam What I Yam – Identity-based Security

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughFebruary 20, 2014Leave a comment

“I yam what I yam, and that’s all what I yam!” Popeye the Sailor echoed these words decades ago. One can only guess how Popeye would respond to identity and access management…

Details

Cylance Enters End-Point Protection Space

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonFebruary 20, 2014Leave a comment

Cylance is a new vendor in the end point protection space. They caught my attention with a completely new way to discover malware on Windows devices. In addition to launching…

Details

Removing Administrator Rights Blocks Critical Microsoft Vulnerabilities

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 19, 2014Leave a comment

Chalk one up for the “It’s so obvious when you think about it,” files. Removing administrator rights from Windows user accounts can block–or at least, slow down–most critical malware infections,…

Details

AlienVault Adds New Partners to Its Crowd-Sourced Threat Intelligence Platform

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 19, 2014Leave a comment

AlienVault has added new partners to its crowd-sourced threat intelligence platform to improve information sharing between private sector organizations, security vendors, and government organizations. The AlienVault Open Threat Exchange program…

Details

Vormetric Introduces Application Layer Encryption Solution

Gail Bronson

Guest Contributor

Archived ArticlesBy Gail BronsonFebruary 19, 2014Leave a comment

Vormetric has announced a new application encryption tool kit, which equips corporate IT departments with the ability to create and integrate encryption in their own applications. The new solution, called Vormetric…

Details
←1
2345678910111213141516171819
…2021222324…
2526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}