Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Reported Data Breaches Double in New Zealand

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesDecember 2, 2013Leave a comment

Data breach notifications in New Zealand more than doubled in the year ending June 30, 2013 climbing to 107, New Zealand’s Office of the Privacy Commissioner stated in its annual…

Details

Akamai to Acquire Prolexic for Some $370 Million in Move to Bolster its DDoS Protection

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesDecember 2, 2013Leave a comment

Akamai Technologies, Inc. (NASAQ: AKAM) today announced that it had signed a definitive agreement to acquire Prolexic Technologies, Inc. for approximately $370 million, in a deal expected to close during…

Details

Several UK Banks Hit by Cyber Attacks in Past Six Months

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesNovember 30, 2013Leave a comment

Several UK banks and financial market infrastructures experienced cyber attacks, some of which disrupted service, in the past six months according to the Bank of England. “While losses have been…

Details

“I am Not Satoshi” – Security Researcher Debunks Rumors that He is the Elusive Inventor of Bitcoin

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonNovember 26, 2013Leave a comment

(Updates with the reported retraction from the two researchers regarding a link between Bitcoin and the Silk Road marketplace.) Recent speculation that Dustin Trammel is the mysterious inventor of Bitcoin and…

Details

How You Should Be Thinking About the Information Security Budget

Victor Wheatman

Advisor

Smaarts, Inc.

Archived ArticlesBy Victor WheatmanNovember 25, 2013Leave a comment

So, how did you do this year with your security budget requests?  And how does the plan look for next year?  With information security representing a competitive arms race with…

Details

Twitter Enables Perfect Forward Secrecy to Bolster Security

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesNovember 24, 2013Leave a comment

Twitter Inc. said it has enabled Perfect Forward Secrecy (PFS) in a move to increase protections around users’ information following reports of secret data mining by the National Security Agency…

Details

PCI Security Standards Council Updates Credit Card Data Security Standard

Gail Bronson

Guest Contributor

Archived ArticlesBy Gail BronsonNovember 22, 2013Leave a comment

The PCI Security Standards Council (PCI SSC), a worldwide forum that develops payment card security standards for its corporate members, has published its latest version of those standards for implementation…

Details

Audit Finds Taxpayer Data is at Risk; Urges IRS to Take Action

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesNovember 22, 2013Leave a comment

Taxpayer data is at risk as disgruntled insiders or malicious outsiders can exploit security weaknesses and the Internal Revenue Service (IRS) should take action, the US Treasury Inspector General For Tax…

Details

Prevent SQL Injection Attacks with DB Networks’ New Core IDS

Linda Musthaler

Managing Editor

Security Current

Archived ArticlesBy Linda MusthalerNovember 22, 2013Leave a comment

What is the top threat to web applications today? According to the Open Web Application Security Project (OWASP), it’s SQL injection. The problem is so pervasive that it has topped the OWASP…

Details

Sometimes Your Employees Go Home; The Case for Securing Home Users

Paul Robertson

Director, Cyber Security

Archived ArticlesBy Paul RobertsonNovember 21, 2013Leave a comment

Bring your own devices (BYOD), USB flash drives, signing into compromised personal web-based accounts from work, and shared passwords. These are some of the reasons for information security professionals to train…

Details
←1
234567891011121314151617181920212223242526
…2728293031…
32
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}