Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

OPM Director Katherine Archuleta Resigns

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesJuly 10, 2015Leave a comment

The director of the Office of Personnel Management (OPM), Katherine Archuleta, has resigned, according to reports. Archuleta stepped down one day after it was revealed that earlier reported cyber attacks had resulted in…

Details

SafeBreach Raises $4 million In First Funding Round

Security Current

Archived ArticlesBy Security CurrentJuly 8, 2015Leave a comment

Cybersecurity startup SafeBreach has raised $4 million in its first round of funding led by Sequoia Capital with additional funding from serial entrepreneur investor Shlomo Kramer, according to reports. Israel-based…

Details

Is Your Identity and Access Management Fit for Purpose?

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyJune 25, 2015Leave a comment

In the old days, identity and access management (IAM) was a mainly internal affair; employees accessing applications, all safely behind a firewall. OK, perhaps the odd remote user, but they…

Details

What Is Privacy?

Daniel Solove

Professor

George Washington University Law School

Archived ArticlesBy Daniel SoloveJune 24, 2015Leave a comment

What is privacy? This is a central question to answer, because a conception of privacy underpins every attempt to address it and protect it.  Every court that holds that something…

Details

Data-Exfiltration Prevention Startup enSilo Raises $10M in Series A Round

Security Current

Archived ArticlesBy Security CurrentJune 16, 2015Leave a comment

enSilo, which provides a data-exfiltration prevention platform, on Tuesday announced that it had raised $10M in Series A funding with Lightspeed Venture  Partners leading the round and existing investor Carmel…

Details

US Government Cyber-Breach Act of Chinese, Reports

Security Current

Archived ArticlesBy Security CurrentJune 5, 2015Leave a comment

Two cyber breaches of US government systems that potentially compromised personally identifiable information of at least four million present and former federal employees is suspected to be the work of…

Details

3 Steps You Can Take to Prep Your Security Program for Docker

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleMay 25, 2015Leave a comment

As many security professionals may already know, Docker has the potential to have a significant impact on an enterprise.  Among numerous potential advantages, it can increase data center allocation density, the…

Details

Security Awareness of the Developer Kind

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughMay 21, 2015Leave a comment

Knock, knock on the door… “Do you have a minute to talk about a report request?” asked the developer. Security awareness typically focuses on employees – the people working in…

Details

VENOM Vulnerability Could Take Bite Out of Your Week

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonMay 13, 2015Leave a comment

The greatest fear of anyone running a virtual machine especially in a shared hosting environment is that an attack against one VM could jump the wall and impact the other…

Details

Security Current’s Chief Information Security Officers (CISOs) Name SentinelOne Winner of Its Inaugural Security High Stakes Competition

Security Current

Archived ArticlesBy Security CurrentMay 4, 2015Leave a comment

Security Current today named SentinelOne the winner of its inaugural Security High Stakes competition.  The event was held at the RSA Conference in San Francisco and brought technology providers face-to-face with…

Details
←1
23
…45678…
91011121314151617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}