What security vulnerabilities are you not seeing in your remote facilities or branch offices? Are you the next Target?

Dubbed a hack-in-the-box, Pwnie Express leverages the same open source tools used by hackers to provide enterprises visibility and the ability to assess vulnerabilities across their networks, both wired and wireless.

securitycurrent's Victor Wheatman speaks with Pwnie Express CEO Paul Paget on the importance of consistent vulnerability assessment and penetration testing across the enterprise.


How does tokenization compare to encryption and format preserving encryption?

Are there performance issues regarding its use? Is it standardized so one solution can exchange tokens with a different implementation?

securitycurrent's Victor Wheatman speaks with Voltage CTO Terrence Spies who urges enterprises to look at their infrastructures, take inventories of what pieces of data they are storing and could be breached, and then catalogue them as they are potential candidates for tokenization.


How are data and communications going to be protected as CPUs and Near Field Communications chips become less expensive and are embedded into the Internet of (Every)Thing?

What are some leading indicators and social media trends that will drive the need?

securitycurrent's Victor Wheatman speaks with Internet of Things (IoT) and mobile application security provider MocanaCEO James Isaacs, and their newly appointed Senior Vice President of Marketing and Corporate Development John Aisien.

What is it? Who provides it? What should an enterprise do with it?
securitycurrent's Victor Wheatman speaks with Spire Security's Pete Lindstrom on this central topic in information security.

A survey conducted by cloud security automation provider Hytrust found that consumers believe corporations don't really care about protecting consumer data. Yet, companies are increasingly moving to the cloud causing a concentration of risk.

securitycurrent's Victor Wheatman speaks with Hytrusts Co-founder and President Eric Chiu about improving trust and what comes after cloud.

What do c-level executives of an organization need to know about security given recent trends? Join Trend Micro's JD Sherry, VP of Technology and Solutions and Rik Ferguson, VP of Security Research as they talk about third party risk, PCI compliance, cyber insurance and the Dark Web with securitycurrent's Victor Wheatman.

Victor Wheatman speaks with Enterprise Management Associates Research Director for the Security and Risk Management Group David Monahan and Forrester Research Principal Analyst for Security Risk Professionals Edward S. Ferrara on Symantec's CyberWar Games 2014.

Some 40 of Symantec's best and brightest attacked a mock bank both logically and physically. Wheatman, Monahan and Ferrara, who were briefed on the exercise, discuss the general state of security across banks, give examples of attacks and the reveal the aim of the hackers.


Victor Wheatman speaks with Gartner analyst Lawrence Pingree on the NSA and RSA and calls by some members of the security community to boycott the upcoming security conference.

It began with a Reuters story from Joe Menn: "Exclusive: Secret contract tied NSA and security industry pioneer." The report disclosed that RSA, the crypto pioneer and security products vendor, had allegedly accepted a secret $10 million payment from the NSA in order to incorporate a backdoor in to their BSafe crypto suite.

Hear their take.

1 13 14 15