What are intelligence aware security controls? Intelligence sharing domains? Shared response infrastructures?  Are they just information security buzz words or do they have actionable meaning?

securitycurrent's Vic Wheatman speaks with Gartner Research Director Lawrence Pingree about these concepts and their usefulness as part of an information security program.

 

From email to texting and other forms of social media, the need for protected communications underscores the requirement to continue encrypted messaging development.

Despite legacy and current solutions on this matter, academic and private research continues in an effort to apply encryption to solving new business problems in numerous contexts.

securitycurrent's Vic Wheatman speaks with Voltage's Chief Technology Officer Terrence Spies about the continuing evolution of secure messaging.

 

Does the Payment Card Industry Data Security Standard (PCI DSS), now in its 3rd version, actually increase safeguards required to be taken by enterprises to ensure customer data?

According to the PCI Security Standards Council, PCI DSS is a comprehensive standard "intended to help organizations proactively protect customer account data."

But with the continuous news of breaches, is it successful? Is being compliant for an audit, essentially a snapshot in time, enough or has the latest version succeeded in bolstering security over the long haul?

securitycurrent's Aimee Rhodes speaks with Gartner Research Vice President Anton Chuvakin, who has spoken with the Standards Council, on the changes in the latest version, how the standard has made real progress in fostering security and what to look forward to in the future with mobile processing.

 

What are use cases for security tools for protecting information in the cloud?

What organizational changes can trigger an enterprise to adopt additional cloud-based protection?

We are increasingly seeing a growth in cloud security providers offering tools to protect information and retain control.

securitycurrent's Vic Wheatman speaks with CipherCloud's Chief Trust Officer Bob West about what we can expect to see in the growing field of cloud security.

 

The Security Innovation Network (SINET) this week held its annual IT Security Entrepreneurs Forum in Silicon Valley.

There, connections were made among early stage security companies, investors, lawyers, regulators, educators and others.

securitycurrent's Vic Wheatman spoke with SINET Chairman and Founder Robert Rodriguez who talks about the goals of the conference, gives its flavor and looks at the role emerging companies take in combatting proliferating security threats.

How valuable is data visualization in spotting patterns on attacks on individuals, institutions or locations?

Understanding what is going on in this realm can help organizations protect themselves against organized cyber criminals, rogue intelligence agencies (or not so rogue possibly), and malevolent nation states.

securitycurrent's Victor Wheatman speaks with Mike Horn, Co-founder and CEO of NetCitadel, a security incident response vendor about this and other issues.

 

What security vulnerabilities are you not seeing in your remote facilities or branch offices? Are you the next Target?

Dubbed a hack-in-the-box, Pwnie Express leverages the same open source tools used by hackers to provide enterprises visibility and the ability to assess vulnerabilities across their networks, both wired and wireless.

securitycurrent's Victor Wheatman speaks with Pwnie Express CEO Paul Paget on the importance of consistent vulnerability assessment and penetration testing across the enterprise.

 

How does tokenization compare to encryption and format preserving encryption?

Are there performance issues regarding its use? Is it standardized so one solution can exchange tokens with a different implementation?

securitycurrent's Victor Wheatman speaks with Voltage CTO Terrence Spies who urges enterprises to look at their infrastructures, take inventories of what pieces of data they are storing and could be breached, and then catalogue them as they are potential candidates for tokenization.

 

How are data and communications going to be protected as CPUs and Near Field Communications chips become less expensive and are embedded into the Internet of (Every)Thing?

What are some leading indicators and social media trends that will drive the need?

securitycurrent's Victor Wheatman speaks with Internet of Things (IoT) and mobile application security provider MocanaCEO James Isaacs, and their newly appointed Senior Vice President of Marketing and Corporate Development John Aisien.

What is it? Who provides it? What should an enterprise do with it?
securitycurrent's Victor Wheatman speaks with Spire Security's Pete Lindstrom on this central topic in information security.

1 13 14 15 16