Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Blending Two Cultures: Management Perspectives on Converging Physical and Information Security

Victor Wheatman

Advisor

Smaarts, Inc.

Archived ArticlesBy Victor WheatmanJanuary 27, 2014Leave a comment

Hey, here’s a good idea: let’s have the part of facilities management that deals with the physical security of the office park, the factory, and the government facility work with…

Details

The [Character] Assassination of Edward Snowden

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 25, 2014Leave a comment

While crass and underhanded, it is not out of the norm for those losing a debate to resort to character assassination. The side that is on the defensive argues by…

Details

Biggest Names in Cryptography Condemn NSA Surveillance

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJanuary 24, 2014Leave a comment

Some of the biggest names in cryptography and computer sciences condemned the US government’s surveillance practices in an open letter. “Media reports since last June have revealed that the US…

Details

Microsoft to Allow International Customers to Store Data on Servers Outside the US

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJanuary 23, 2014Leave a comment

Microsoft will allow international customers to store their data on servers located outside US borders, Microsoft’s general counsel said Wednesday. The fallout from documents leaked by ex-Booz Hamilton contractor Edward…

Details

Snowden Calls For Termination of Unwarranted Surveillance

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 23, 2014Leave a comment

In a live chat hosted by The Courage Foundation Edward Snowden called on the US to stop the mass collection of telephone records by the NSA, authorized under section 215 of…

Details

From the Outside, Looking in(to) Recent Breaches

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughJanuary 23, 2014Leave a comment

It’s a toss-up as to whether retailer card breaches or NSA activity is the hotter news story of the day. So far, 2014 has seen its fair share of security…

Details

You Mad Bro? You Will Be, After Watching These Jacob Applebaum Videos

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 23, 2014Leave a comment

The reactions to the depth and scope of the NSA’s surveillance apparatus has varied from ho-hum, “that’s their job,” to OMG “it’s the end of the world as we know…

Details

VMware to Acquire Mobile Security Firm AirWatch for $1.54 Billion

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesJanuary 22, 2014Leave a comment

VMware, Inc. today announced that it had entered into a definitive agreement to acquire mobile management and security solutions provider AirWatch for $1.54 billion. VMware said it would pay approximately…

Details

Notorious Hacker Guccifer Reportedly Arrested

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJanuary 22, 2014Leave a comment

Romanian law enforcement authorities have arrested a man they believe is “Guccifer,” the hacker who broke into email accounts of high-profile individuals, such as George W. Bush. Guccifer leaked several of the former…

Details

Shape Security Comes Out of Stealth Mode with Network Appliance that Disables Attacks on Websites and Web Apps

Gail Bronson

Guest Contributor

Archived ArticlesBy Gail BronsonJanuary 21, 2014Leave a comment

Shape Security disclosed today that after two years of research and development, the company has built a network security appliance called a botwall, which it said protects websites against a…

Details
←1
2345678910111213141516171819202122
…2324252627…
2829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}