Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Executive Viewpoints

Don’t Let the Dow Jones Security Incident Happen to You: Strategies and Steps for Vendor Risk Management

Mike Puglia

Chief Strategy Officer

Kaseya

Here we go again. When news broke Feb. 27 that a Dow Jones database of 2.4 million businesses and individuals was left on a public server without encryption or password…

Details

Software Defined Access: The New Requirement for Remote Work Environments

Etay Bogner

Founder and CEO

Meta Networks

Technology is rapidly changing work as we know it. Work is no longer bound by a physical place or specific time. Organizations must adapt to a multigenerational labor force and…

Details

Debunked: 5 Myths of Privileged Access Management

Tim Steinkopf

CEO

Centrify Corporation

From a cybersecurity standpoint, 2018 was a disaster. We saw three of the ten biggest data breaches of all time, according to USA Today: Marriott (500 million accounts), Under Armour…

Details

Don’t Let Complexity Get the Best of You

Ruvi Kitov

CEO & Co-Founder

Tufin

Computer networking has always evolved at a rapid pace, but it seems to be accelerating at a far greater rate today, resulting in unprecedented challenges for network security managers. The…

Details

Stopping the cat-and-mouse game

Tal Zamir

If I were a cyber attacker, I wouldn’t go after just any user. I’d target privileged users. They are the people who hold the keys to the kingdom, so to…

Details

Shifting Your Cybersecurity Strategy to Stop People-Centric Threats

Security Current

Keeping companies safe from determined cybercriminals is an everyday battle as threats continue to evolve and business practices change. For many security teams, the question remains: What steps should organizations…

Details

Foremost, be Forthright: Communicating in the Event of a Cybersecurity Incident

Security Current

by Jeff McAndrews, Partner, and Kirsti McCabe, Managing Director, Finsbury Discovering that your company’s cybersecurity has been compromised is likely among the worst nightmares for any CISO. What do you…

Details

How to Write a Great CISO Resume – Know What to Include

Matt Comyns

Managing Partner, Cyber Security Practice

The Caldwell Partners

Managing Partner, Caldwell Partners The Chief Information Security Officer (CISO) job has changed significantly in the last couple of years. It has historically been more of a lower-level, tactical IT…

Details

No longer an afterthought: Security analytics takes its place in business strategy

Security Current

There are two philosophical schools as to how companies can protect their system. They can either do it prescriptively, telling people what they can or cannot do. The problem with…

Details

The Path of Least Resistance: Security in the Media and Entertainment Industry

Security Current

When Jonathan Halstuch, CTO of RackTop Systems, started providing security solutions to media and entertainment industry 18 years ago, material like videos and photos needed to be physically transported from…

Details
→12→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}