Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Point/Counterpoint: The Current State and Future of Biometrics – Part One

John Masserini

CISO

Millicom (Tigo) Telecommunications

Archived ArticlesBy John MasseriniMarch 13, 2016Leave a comment

In this two-part Q&A, Morey Haber and John Masserini discuss the current and future state of biometrics. Industry thought leaders, Haber and Masserini address leading questions surrounding biometrics from the…

Details

Security Current Names Exabeam Winner of the 2016 Security Shark Tank® California

Security Current

Archived ArticlesBy Security CurrentMarch 8, 2016Leave a comment

  Chief Information Security Officers (CISOs) Select User Behavior Analytics Provider Exabeam for Its Innovation and Importance to the Business Security Current, the premier information and collaboration community by CISOs…

Details

Targeted Attacks Plague the EU Driving Data Protection Changes

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyFebruary 2, 2016Leave a comment

U.S. companies that operate in the European Union (EU) need to understand what drives European organizations when it comes to data protection. This applies to both commercial organizations that want…

Details

5 Security Gains During Holiday Downtime

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleDecember 16, 2015Leave a comment

It’s the end of the year, which means that the holidays are nigh upon us.  For those of us in security, it’s a time of heightened vigilance.  We know from…

Details

Social Media Cybersecurity Company ZeroFOX Secures $27M in Series B Round

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesDecember 4, 2015Leave a comment

Social media cybersecurity company ZeroFOX has announced that it has raised $27 million in an angel round led by Silicon Valley venture firm Highland Capital, along with previous investors New…

Details

Alternative Medicine for Security

Steve Hunt

Principal Consultant

Hunt Business Intelligence

Archived ArticlesBy Steve HuntNovember 25, 2015Leave a comment

Let’s make a correlation between medicine and security. Many people rely on Western medicine for health and wellness. We purchase pharmaceuticals from the major producers, and go to doctors when…

Details

Company That Provided Backups of Clinton Emails Raises 75 Million In Series B

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesNovember 17, 2015Leave a comment

Datto Inc., the company that provided backups of Democratic presidential front-runner Hillary Clinton’s email accounts, today announced that it had raised $75 million in Series B funding, bringing the total…

Details

Governance 3.0: Destructive vs. Constructive Technology Adoption

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleNovember 9, 2015Leave a comment

Have you ever heard of “destructive interference?”  In physics, this is the principle that describes the interaction of two waves in exact opposite phase. What happens when two waves are…

Details

Cisco Systems to Buy Lancope for $452.5 Million

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesOctober 28, 2015Leave a comment

Cisco Systems Inc. said earlier this week it will acquire privately held security company Lancope Inc. for  $452.5 million in order to boost its cybersecurity threat defense capabilities. A provider…

Details

Former NSA Chief’s Keith Alexander’s IronNet Cybersecurity Startup Raises $32.5 Million

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesOctober 26, 2015Leave a comment

Former US National Security Agency (NSA) Director Keith Alexander’s IronNet Cybersecurity startup said on Monday that it had raised $32.5 million in a Series A funding round led by Trident…

Details
←123456…
7891011121314151617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}