Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Cyberoam Now 100 Percent Subsidiary of Sophos

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesFebruary 17, 2014Leave a comment

Post the recent Sophos acquisition of Cyberoam its CEO and MD Hemal Patel gives securitycurrent more information on the terms and what the acquistion means. sc: Sophos already acquired a UTM vendor.…

Details

NIST Releases Long-Anticipated Framework for Improving Critical Infrastructure Security

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 14, 2014Leave a comment

The National Institute of Standards and Technology (NIST) has released the long-anticipated Framework for Improving Critical Infrastructure Security. The framework, released on February 12th, provides critical infrastructure operators with a broad…

Details

Congress Moves Substitute Critical Infrastructure Cybersecurity Bill

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 10, 2014Leave a comment

The House Homeland Security Committee unanimously passed a substitute bill for the National Cybersecurity and Critical Infrastructure Protection Act of 2013 last week. The bill now heads to the full House for…

Details

Sophos Acquires Cyberoam Technologies

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 10, 2014Leave a comment

Sophos expanded its network security portfolio with its latest acquisition of India-based Cyberoam Technologies for an undisclosed sum, the company said February 10th. The acquisition gives Sophos access to Cyberoam’s expertise in next-generation…

Details

Texas Hospital Exposes Security Breach of Some 405,000 Records

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 7, 2014Leave a comment

Health records of up to 405,000 past and current patients at St. Joseph Health System may have been exposed in a security incident, the Texas-based hospital said February 5. St. Joseph…

Details

Palo Alto Shares Rally on Favorable Rulings in Juniper Lawsuit

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 6, 2014Leave a comment

Shares of Palo Alto Networks jumped more than 11 percent on February 6 after a judge handed down a favorable decision for Palo Alto Networks in the patent infringement lawsuit brought…

Details

Security Awareness Solutions at a Glance

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughFebruary 6, 2014Leave a comment

Security awareness is a waste of time and employees should be punished for being careless! To each his own philosophy as to whether this mindset is believable and sincere. Granted,…

Details

Chaos Computer Club Sues German Government Over Mass Spying Claims

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 3, 2014Leave a comment

The Chaos Computer Club and the International League for Human Rights filed a criminal complaint with Germany’s Federal Prosecutor General’s Office, the Europe’s largest association of hackers said on February 3.…

Details

FIS, DHS Partner on Cybersecurity Research

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidFebruary 3, 2014Leave a comment

FIS, a large banking and payments technology provider, will collaborate with the U.S. Department of Homeland Security as a cybersecurity research partner, the company said on February 3rd. Under the partnership,…

Details

Covertix SmartCipher Protects Key Confidential Files

Linda Musthaler

Managing Editor

Security Current

Archived ArticlesBy Linda MusthalerFebruary 3, 2014Leave a comment

The healthcare market has been generating much attention lately.  Everyone from individuals to corporate executives is focused on the changes and provisions as they relate to health insurance. Well, almost…

Details
←1
234567891011121314151617181920
…2122232425…
26272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}