Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

Cyber Defense: We’ve Been Doing It Backwards

Randy Marchany

CISO

Virginia Tech

CISO InsightsBy Randy MarchanyMarch 20, 2014

The number of breaches that have occurred in the past 12 months (Target, U of MD, etc.) serve as a warning that traditional defense mechanisms are not working.  I ask…

Details

Security, Where Myths Should Go to Die

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerMarch 13, 2014

There are tellers of tales and debunkers of myths. An organization needs both. An example: the March of Dimes needed people to have the vision of eradicating Polio.  Its very…

Details

You Can’t Stop Stupid: Security in the Academic World

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattMarch 4, 2014

One would think that working in a very prestigious university would simplify the job of the security department.  All you would have to do is tell people what was required…

Details

What Have We Been Doing The Past 10 Years?

Randy Marchany

CISO

Virginia Tech

CISO InsightsBy Randy MarchanyFebruary 26, 2014

You know you’ve reached a point in your career when you get asked to give a talk on how IT has evolved over the past 10-15 years.  I guess it’s a…

Details

Not Like the Others

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerFebruary 12, 2014

(This is the sixth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…

Details

IPv6 – It’s Time

Randy Marchany

CISO

Virginia Tech

CISO InsightsBy Randy MarchanyJanuary 28, 2014

VA Tech is one of the few institutions in the US that runs a full production, dual stack IPv4/IPv6 network. We’ve been running this dual stack network since 2005. All…

Details

Being Data – The Principle of Participation

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerJanuary 11, 2014

(This is the fifth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…

Details

Restricting Users With Admin Privileges Solves the Wrong Problem

Randy Marchany

CISO

Virginia Tech

CISO InsightsBy Randy MarchanyJanuary 4, 2014

CONTROL: Minimize the number of users with domain or local administrative privileges. Such users should use a separate unprivileged account for email and web browsing. This control is misunderstood and…

Details

Consent: The Part of ‘Yes’ that We Don’t Necessarily Understand

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerDecember 21, 2013

(This is the fourth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…

Details

Smile, You’re On Candid Camera: The Lack of Privacy in Today’s World

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattDecember 12, 2013

I think that there is some confusion about the concept of privacy in a public setting.  It appears to me that some people really believe that they can walk around,…

Details

Have Data Will Travel

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattDecember 7, 2013

I was recently invited to speak to senior executives about traveling with electronic devices.  I designed a presentation consisting of 11 slides and guessed it would take about half and…

Details

Security Models – One Size Does Not Fit All

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattDecember 5, 2013

Security is a word that brings up many different images depending on your experience, profession or industry.  At a University, not only is the context different than at a bank,…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}