Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Federal Weather System Breached

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidNovember 12, 2014Leave a comment

China-based attackers are back in the news again, this time for breaching the federal weather network, officials told the Washington Post. The initial intrusion appears to have occurred late September,…

Details

FBI Investigates Cyber Attack on US Postal Service

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidNovember 11, 2014Leave a comment

The Federal Bureau of Investigation is investigating a cyber attack earlier this year against the U.S. Postal Service that exposed the personal information of every single employee. Personal information of…

Details

The Problem of Buggy Software Components

Bob Tarzey

Senior Director

Quocirca Ltd

Archived ArticlesBy Bob TarzeyNovember 3, 2014Leave a comment

What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers…

Details

More Calls for Businesses to Adopt EMV Chip Payment Technology

Fahmida Rashid

Senior Writer

CSO

Archived ArticlesBy Fahmida RashidOctober 28, 2014Leave a comment

Another industry alliance joined the chorus urging businesses that process debit and credit cards to implement EMV payment chip technology to combat fraud. EMV stands for Europay, MasterCard® and Visa®, the…

Details

Legacy Security Controls: Time to Pull the Plug?

Ed Moyle

Director of Thought Leadership and Research

ISACA

Archived ArticlesBy Ed MoyleOctober 23, 2014Leave a comment

It’s a fact of life that most IT shops have, to one degree or another, a “security products graveyard” – i.e. security technology that’s past its prime, performing poorly, or…

Details

Splitting Symantec is the Right Thing To Do – Now it is Intel’s Turn

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonOctober 10, 2014Leave a comment

The current flurry of breakups in the tech sector is gratifying to watch. The only conglomerate strategy I have ever seen work effectively is Alfred P. Sloan’s revolutionary “centralized decentralization”…

Details

What CISOs Must Know About Fighting Identity Theft

Victor Wheatman

Advisor

Smaarts, Inc.

Archived ArticlesBy Victor WheatmanOctober 5, 2014Leave a comment

High-level strategies for defending against attacks to steal identities are twofold: solutions on the back end, and what consumers and business partners can do to protect themselves. Almost daily, we…

Details

The Thanks-Rob Worm to Come

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonSeptember 25, 2014Leave a comment

By now you have heard about a new bug in one of the most popular Unix shell programs, the Bourne Shell, or bash.  If you run Mac OSX you probably…

Details

Security Versus Compliance: What’s the Difference?

Steve Hunt

Principal Consultant

Hunt Business Intelligence

Archived ArticlesBy Steve HuntSeptember 23, 2014Leave a comment

Security is the pursuit of perfect protection through ongoing tightening of defenses and preemptive activities to cover vulnerabilities.  Risk management, on the other hand, is a discipline that enables organizations…

Details

eSentire Raises $14 Million in Series C Round

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesSeptember 16, 2014Leave a comment

[usp_status display=”email”] eSentire, a Canadian technology and security services company, said on Tuesday that it had raised $14 million in a series C investment round led by Georgian partners, with…

Details
←1
23456
…7891011…
121314151617181920212223242526272829303132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}