Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Schneier Joins Co3 Systems as CTO

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 6, 2014Leave a comment

Security incident handling software company, Co3 Systems, announced today that Bruce Schneier had joined the company as CTO. Schneier is a highly regarded author and cryptographer who writes frequently on topics…

Details

Will FireEye’s Acquisition Strategy Work?

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 5, 2014Leave a comment

Most of the press and preliminary analysis of the FireEye acquisition of Mandiant has been exuberant. The New York Times got to break the news just after the first of the New…

Details

Growing Boycott of RSA Conference 2014

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonJanuary 5, 2014Leave a comment

[Full disclosure: As an industry analyst I conduct business with RSA, the security division of EMC, including white papers and recording videos of key executives and customers.] It began with…

Details

FireEye Acquires Mandiant in $1.05 Billion Deal

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesJanuary 2, 2014Leave a comment

Threat protection vendor FireEye announced on Thursday that it had acquired security incident response provider Mandiant in a cash and stock deal worth more than $1 billion based on the current value…

Details

The Increasing Mobility Threat to IT Security

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyJanuary 2, 2014Leave a comment

Any organization that has not already started to think about the impact mobility has on IT security should start doing so this year. 63% of businesses provide formal access to some…

Details

The Role of Emotion in the Target Breach

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughJanuary 1, 2014Leave a comment

“It’s the most emotional tiiiimmme of the yeeeaaar”… The holidays, filled with emotion. There’s so much going on – from travel, to shopping, to family gatherings, and of course the mad…

Details

IT Security Industry Has a New Adversary

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonDecember 30, 2013Leave a comment

My coverage of the NSA’s massive data gathering and attacks on fundamental security technology has been focused on the expected impact on the IT security industry. I was one of…

Details

The Incredible Power of XKeyscore

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonDecember 30, 2013Leave a comment

Der Spiegel makes light of an incredible tidbit they extracted from a 50-page catalog of exploit technology apparently developed by the NSA’s Tailored Access Operations (TAO).  The German newspaper describes, and dismisses as…

Details

IT Security Industry Has a New Adversary

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonDecember 30, 2013Leave a comment

My coverage of the NSA’s massive data gathering and attacks on fundamental security technology has been focused on the expected impact on the IT security industry. I was one of…

Details

Getting Real About Network Access Control (NAC)

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyDecember 29, 2013Leave a comment

The two biggest concerns organizations have when considering the use of cloud based services are the safety of personal data and complying with data protection laws (see complimentary Quocirca report,…

Details
←1
23456789101112131415161718192021222324
…2526272829…
303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}