Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

If You Host It, They Will Come

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughNovember 20, 2013Leave a comment

Would employees show up to a voluntary lunch and learn session on phishing, password tips, and two-step verification? Contrary to the security awareness pessimists’ responses, they will. Of course there…

Details

Does the NSA Use Quantum Computing to Break Things?

Victor Wheatman

Advisor

Smaarts, Inc.

Archived ArticlesBy Victor WheatmanNovember 20, 2013Leave a comment

In the continuing stream of revelations about reported NSA hacking to protect national interests comes more news. Data moving between data centers operated by the world’s largest Internet email companies allegedly…

Details

Boom Times for Cloud Security

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonNovember 18, 2013Leave a comment

Amazon announced several initiatives at its AWS re:Invent conference that are destined to disrupt several markets Held last week in Las Vegas, the Amazon Web Services’ conference hosted more than…

Details

Gartner Says “Agility” is Primary Driver for Private Cloud Adoption; Predicts Increased Hybrid Cloud Acceptance

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesNovember 18, 2013Leave a comment

Private cloud computing is a “reality” for half of large enterprises with agility being the key driver, according to Gartner, Inc. In a recent research report, “Private Cloud Matures, Hybrid…

Details

Security as a Proactive Business Tool

Charles Kolodgy

Senior Security Strategist

IBM

Archived ArticlesBy Charles KolodgyNovember 15, 2013Leave a comment

IT security is a complicated issue.  However, the focus on what security can do, can’t do, and how it is perceived, ordinarily is narrow.  Generally, managers deal with security in…

Details

The Devil Inside the Beltway: Not for the Faint of Heart

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonNovember 13, 2013Leave a comment

The Devil Inside the Beltway is a chilling memoir that documents the shambles made of Michael Daugherty’s life by apparent regulatory overreach on the part of the Federal Trade Commission…

Details

IT Security Salaries Expected to Increase in 2014

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesNovember 12, 2013Leave a comment

IT-security related salaries are expected to climb in 2014, according to a survey released by TEKsystems, which polled some 900 IT leaders including CIOs, IT VPs, IT directors and IT hiring managers, Some…

Details

Software Defined Radio: A Hacker’s Dream

Paul Robertson

Director, Cyber Security

Archived ArticlesBy Paul RobertsonNovember 11, 2013Leave a comment

Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn’t light- or sound-based will attract a hoard  of researchers (and attackers) looking at ways to exploit …

Details

Trustwave Acquires Application Security Inc.

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonNovember 11, 2013Leave a comment

Trustwave announced on Monday that it had acquired data security provider Application Security Inc., for an undisclosed sum as Trustwave continues its strategy of acquiring security technology vendors to spur its…

Details

HyTrust Acquires Competitor HighCloud Security

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesNovember 7, 2013Leave a comment

Cloud security provider HyTrust Inc. said on Thursday it had acquired HighCloud Security for an undisclosed sum, striking a deal it said would round out its security offering. The move follows…

Details
←1
23456789101112131415161718192021222324252627
…282930313233→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}