Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

Why Does My Secret Decoder Ring Keep On Breaking?

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattMay 26, 2015

I’ve been around the computer business for a long time.  Way back, before the Web and even before computers, if you wanted to send a secret message to someone, you…

Details

In-House Software Development — Is it Worth the Risk?

Hussein Syed

CISO

RWJBarnabas Health

CISO InsightsBy Hussein SyedMay 12, 2015

Nowadays, data breaches are a subject of conversation at dinner tables and in boardrooms. Cyber insurance premiums to cover these breaches are skyrocketing. Recent surveys and breach reports have highlighted…

Details

What Is an Act of War?

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattMay 12, 2015

I went to the Educause Security Professionals Conference last week.  I have been going to this conference for many years and always take home something useful.  This year, James Bamford,…

Details

A CISO Checklist: 10 Tips to Get Back on Track

Farhaad Nero

VP

Enterprise Security Bank of Tokyo-Mitsubishi

CISO InsightsBy Farhaad NeroMay 4, 2015

The world of the CISO is becoming an almost  thankless job. No matter what you do, how well you present to the Board, how complete your program is, it seems…

Details

Booth Babes Banned at RSA – A CSO’s View

John Masserini

CISO

Millicom (Tigo) Telecommunications

CISO InsightsBy John MasseriniMay 2, 2015

While I was unable to attend RSA this year, after reading Chenxi Wang’s LinkedIn post on ‘Booth Babes’, I have to say… It’s about damn time. To briefly recount a personal experience,…

Details

Positive or Negative, Security Needs to be Right

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattApril 28, 2015

One of the aphorisms used in security is, “We have to be right all of the time, and the bad guys only have to be right once.”  While this may…

Details

Truly Positive About True Negatives

Timothy Kropp

Technology Security Lead

Bridgewater Associates

CISO InsightsBy Timothy KroppApril 23, 2015

Bayes’ Theorem essentially measures the degree of belief, or certainty in something.  The Cybersecurity industry has been challenged with the idea of sensitivity and specificity for quite some time.  In…

Details

Falsely Negative About False Positives

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerApril 22, 2015

Distributed Denial of Service (DDoS) attacks are very inefficient but very effective.  Auditors are careful to be sure their findings are accurate so that they are not accused of being…

Details

If Only Email Could Fix My Security Problems

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattApril 21, 2015

Just for fun, I decided to count how many unsolicited emails I got in a 24 hour period offering to either fix my security problems, fix my network problems, fix…

Details

Want to Know What’s the Secret to YOUR Success?

Christine Vanderpool

CISO

Florida Crystals

CISO InsightsBy Christine VanderpoolApril 14, 2015

So you want to know what the secret to success is. First, you need to change the way you look at and ask the question. Instead of wondering what the…

Details

Music and Cybersecurity Defect Detection

Timothy Kropp

Technology Security Lead

Bridgewater Associates

CISO InsightsBy Timothy KroppApril 8, 2015

If you have ever sat through an orchestral concert, you would hear the first chair oboe playing a single note for the rest of the fellow orchestral players to latch onto…

Details

Privacy Is Not Dead, But It Is On Life Support

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattApril 2, 2015

As a security professional, I have an ongoing love/hate relationship with privacy.  I have always been the person supporting privacy policies at the University, I even have Privacy as one…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}