Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

A Brief History of Cyber Attacks and the Olympics

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonFebruary 3, 2014Leave a comment

The first time I was exposed to the IT security concerns of the Olympics was in 2003 when a delegation from China visited the US to garner advice on protecting…

Details

Why Would they DoS Us?

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyFebruary 3, 2014Leave a comment

As various pundits have reeled off their security advice for 2014 many have listed the growing threat of denial of service (DoS) attacks as something to look out for. They…

Details

ScrapeDefender Protects Website Content With New Anti-Scraping Software

Gail Bronson

Guest Contributor

Archived ArticlesBy Gail BronsonJanuary 30, 2014Leave a comment

These days every company conducting business on the Internet must be vigilant to stave off the endless onslaught of viruses and other malware.  Attackers who use software programs to make…

Details

SpyEye Developer Pleads Guilty

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJanuary 29, 2014Leave a comment

The primary developer behind banking Trojan SpyEye pleaded guilty January 28 to committing wire and bank fraud, according to a statement from the

Ordinary Folk

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 29, 2014Leave a comment

I have a pet peeve. It’s the use of the word “folks,” which has been popularized by the current administration. I know it makes the President appear avuncular and, well, folksy.…

Details

U.S. Lifts Gag Order on Government Requests for User Data

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJanuary 28, 2014Leave a comment

Under new Department of Justice rules, technology and telecommunications companies are now allowed to provide more information about government requests for customer data. However, they will still be restricted from disclosing…

Details

Lockheed Martin and EMC to Invest in Advanced Technology Projects in Israel

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesJanuary 27, 2014Leave a comment

Global security company and defense contractor Lockheed Martin Corp and data storage equipment maker EMC Corp, RSA’s parent company, have announced that they will jointly invest in technology projects including…

Details

New Reports that NSA Searches Angry Birds and Other Apps for Personal Data

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 27, 2014Leave a comment

Late Monday three separate media outlets reported on how the NSA snoops on data transmitted from cell phone apps.  The New York Times, The Guardian, and ProPublica each covered how…

Details

Bitcoin Exchange CEO Arrested for Money Laundering

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesJanuary 27, 2014Leave a comment

The CEO of Bitcoin New York-based exchange BitInstant, Charlie Shrem, was arrested and charged with money laundering. In the federal criminal complaint, the Southern District of New York charges that…

Details

Schneier Predicts Ramping Up of Cyber Crime

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 27, 2014Leave a comment

In an interview with the BBC well know security expert Bruce Schneier declaimed that intelligence agency attacks on Internet infrastructure have broken trust. “The fact that it has been subverted in ways…

Details
←1
23456789101112131415161718192021
…2223242526…
272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}