Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

The DHS SWAMP: What It Is and What It Means for Practitioners

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleFebruary 19, 2015Leave a comment

I know it might sound sort of corny but whenever I think of the Department of Homeland Security (DHS) “SWAMP” program (the Software Assurance Marketplace) my mind immediately goes to The Empire…

Details

Healthcare.gov Site Reportedly Sharing Personal Information of Visitors

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidJanuary 22, 2015Leave a comment

The healthcare.gov site is sharing personal information about visitors to its site to third-party advertisers, according to a report by The Associated Press. The website for the federal healthcare exchange provides…

Details

Vice President Biden Announces $25 Million in Funding for Cybersecurity Education with Focus on Minorities

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesJanuary 21, 2015Leave a comment

Vice President Joe Biden has announced that the Department of Energy (DoE) will provide a $25 million grant over the next five years to support minorities and cybersecurity education. The…

Details

Planning Security: 3 Things to Look for in 2015

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleJanuary 19, 2015Leave a comment

Well, the New Year is upon us. Which for most of us means a few things: taking stock of the year that’s just passed, deciding what we can do better…

Details

Offense vs. Defense – Unite!

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughJanuary 9, 2015Leave a comment

You can feel the enthusiasm this time of year as football playoffs and bowl games capture massive attention. Us vs. them. You vs. me. Offense vs. defense. In the sporting…

Details

The Sony Breach is Not The Government’s Problem

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonDecember 19, 2014Leave a comment

If the first indication that you have been hacked is your screens going blank or displaying an attacker’s message you are in real trouble. Another indicator that your organization does…

Details

Is Your Online Security Fit for the Online Consumer?

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyDecember 2, 2014Leave a comment

There are few businesses that are not dependent to some extent on their online presence. Websites are no longer simply a source of information, but a place to transact with…

Details

FBI Warns of Destructive Malware Post Sony Attack

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidDecember 2, 2014Leave a comment

Cybercriminals are targeting U.S. businesses with malware with destructive capabilities, much like the one that recently crippled Sony, the Federal Bureau of Investigation warned late Monday. The malware described in…

Details

Black Friday – Paper or Plastic?

Mike Saurbaugh

Faculty Member

IANs Research

Archived ArticlesBy Mike SaurbaughNovember 27, 2014Leave a comment

Happy anniversary? One year ago the infamous Target breach occurred; November 27 to be exact. Unless you’ve not ventured out to a retailer in 2014, there’s a good chance you’ve…

Details

Analyzing the Security Management of Docker

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleNovember 26, 2014Leave a comment

It’s the holiday season, which means that many of us are already in the process (or soon will be) of putting up holiday decorations.  Ordinarily that wouldn’t be particularly noteworthy…

Details
←1
2345
…678910…
11121314151617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}