Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Tech Vendors Look to Singapore as Hub for Asian Headquarters

Security Current

Archived ArticlesBy Security CurrentApril 23, 2015Leave a comment

Singapore is quickly becoming the country of choice for technology vendors seeking to establish a hub in Asia. Ranked first in Asia, and seventh worldwide, in the Global Innovation Index…

Details

Analyzing InfoSec Opportunity Costs

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleApril 21, 2015Leave a comment

There are a number of lessons that we in security can learn from the world of economics.  This isn’t an original observation on my part: in fact, there are a…

Details

The Rise and Rise of Bad Bots – Part 2 – Beyond Web-Scraping

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyApril 16, 2015Leave a comment

Anyone who listened to Aleks Krotoski’s 5 short programs on Radio 4 in the UK titled Codes that Changed the World will have been reminded that applications written in COBOL, despite…

Details

The Rise and Rise of Bad Bots – Part 1 – Little DDoS

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyApril 15, 2015Leave a comment

Many will be familiar with the term bot, short for web-robot. Bots are essential for effective operation of the web: web-crawlers are a type of bot, automatically trawling sites looking…

Details

Clean Pipes At Last: Zscaler Introduces Cloud Firewall

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonApril 14, 2015Leave a comment

In 1995 a small security reseller in Southfield, Michigan, introduced possibly the first “cloud” based firewall: Check Point FW1 running on Sun Netra boxes in their small data center. Netrex…

Details

Approaching the Singularity in Situational Awareness

Chris Blask

Director, Industrial Control Systems Security

Unisys

Archived ArticlesBy Chris BlaskApril 13, 2015Leave a comment

The gravity well of situational awareness has been pulling on us since the earliest days of information protection. The ever-increasing sophistication of threats and compounding complexity of our systems is…

Details

Behavioral Change Through Influence

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughApril 10, 2015Leave a comment

Influence, it’s one of those things which some have mastered. In the business world influence can be used as an advantage in order to achieve the desired outcome. Many people…

Details

2015 Continues to be Strong Year for Cybersecurity Venture Funding

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesApril 6, 2015Leave a comment

As cyber threats loom larger, the number of security vendors continues to grow and venture capital continues to flow across the cybersecurity ecosystem. Three cybersecurity companies announced over the past…

Details

Insurance Companies Need to Eat Their Own Dog Food

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyMarch 26, 2015Leave a comment

Many insurance companies aspire to sell policies to their customers that will provide financial mitigation against cyber-attacks. That is all well and good, but they need to make sure their…

Details

InfoSec World 2015 – Recap

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughMarch 26, 2015Leave a comment

InfoSec World 2015 just wrapped up from Disney’s Contemporary Resort in Orlando, Florida. With around 1200 attendees, over 75 speakers, and over 50 exhibitors, the event provided something for everyone.…

Details
←1
234
…56789…
1011121314151617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}