Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

www.securitycurrent.com/en/podcasts/podcasts_index
The securitycurrent podcast explores what is really on the mind of information technology security executives and practitioners.


127: EDR for All – Bitdefender Discusses Best Practices for Implementing Endpoint Detection and Response Technology
Apr 4, 2018 • 11 min
Information security is tough: the bad guys only need to get it right once, the good guys have to get it right all the time. 100% protection of all endpoints isn’t possible, and eventually, there will be an infection. The question is, how can you quickly…
126: Tufin Talks Increasing Security and Agility Through Security Policy Orchestration
Nov 7, 2017 • 11 min
Enterprise network environments grow more complex daily. Apps run on prem and in the cloud with hundreds to thousands of firewall rules. This increases complexity and puts the network at greater risk. Making one policy change can have a ripple effect…
125: Ron Green, Mastercard Executive VP & CISO, Talks New Technologies, What Keeps Him Up at Night and Provides Recommendations to His Peers
Oct 9, 2017 • 10 min
Mastercard is a technology company in the global payments industry which operates the world’s fastest payments processing network, connecting consumers, financial institutions, merchants, governments and businesses in more than 210 countries and…
Maxim Integrated Chief Cyber Risk Officer and SentinelOne’s CEO Talk Endpoint Security, Automation and Visibility
Sep 28, 2017 • 12 min
The endpoint is becoming the new edge of the business. As the doorway to your data, with more and more breaches getting in via the endpoint, it’s turning into one of the weakest links for today’s business. As you’ll hear in this SentinelOne sponsored…
123: Bay Dynamics CEO Discusses How to Gain Insight in to Security Risks Using User Behavior Analytics
Aug 28, 2017 • 9 min
CISOs are increasingly looking to User Behavior Analytics as a key security tool to help combat today’s threats. According to the report, CISOs Investigate: UBA, by quickly providing actionable intelligence, UBA allows them to potentially reduce loss to…
122: CISO David Cass Talks Cloud Adoption and Security
Jun 6, 2017 • 14 min
David Cass Speaks with Cloud Access Security Broker Bitglass
121: Joey Johnson, Premise Health CISO, Discusses Challenges in Securing Distributed, Highly Regulated Environments
Mar 27, 2017 • 13 min
Premise Health is a leader in onsite health and wellness programs providing some 600 large employer sponsored employee clinics. With a highly distributed and regulated environment, Johnson is responsible for all cybersecurity and information…
120: DocuSign CISO Discusses the Human Element of Incident Response
Feb 28, 2017 • 13 min
DocuSign CISO Speaks with IBM Cloud and SaaS CISO
119: Marci McCarthy, President & CEO of T.E.N. and Founder of the ISE® Awards Provides Insights into the Evolution of the CISO Role
Feb 23, 2017 • 9 min
The CISO increasingly has a seat in the boardroom, as the role is becoming more of the rule than the exception in enterprises. During RSA Conference 2017, Marci McCarthy, President & CEO of T.E.N., sat down with David Cass, Global CISO IBM Cloud…
119: San Diego CISO Gary Hayslip Talks Strategies for Building Executive Buy-in, Security Tech and Leveraging the Cloud
Feb 21, 2017 • 12 min
The city of San Diego is a $4 billion business and it doesn’t shut down. As you’ll hear in this discussion between Gary Hayslip, the city’s CISO, and David Cass, Global CISO IBM Cloud and SaaS, San Diego is a smart city which is continuously…
118: Global CISO David Cass Discusses the Proliferating Attack Surface Being Created by Internet of Things Devices with ForeScout’s Commercial CTO and VP Len Rosenberg
Feb 10, 2017 • 12 min
There has been an exponential adoption of Internet of Things (IoT) with experts predicting billions of IoT devices coming into use. And with the strategy more often than not being go to market and secure it later, enterprises are increasingly exposed…
117 SC: Gartner Research VP Anton Chuvakin Talks New CISOs at RSA, New Technologies and Box Fatigue with Global CISO David Cass
Feb 9, 2017 • 12 min
With RSA around the corner and more security vendors than you can count, if you are a new CISO at the conference what should your game plan be? As you’ll hear in this podcast, the sheer number of interesting technologies at RSA can potentially…
116: Jason Witty, US Bancorp EVP and CISO, Discusses The Benefits of Tokenization with David Cass, Global CISO IBM Cloud & SaaS
Jan 31, 2017 • 10 min
Tokenization is helping render data theft obsolete. Jason Witty, US Bancorp EVP and CISO, is in the midst of completing a multi-year tokenization integration project, for which his team won the recent ISE North America Project of the Year Award in the…
115: Gartner Research VP Anton Chuvakin Speaks with Global CISO David Cass on Security Monitoring, SIEM and UBA
Jan 17, 2017 • 11 min
What specific things should companies look at when it comes to security monitoring in 2017? As you’ll hear in this podcast, a lot of the security problems facing organizations from the late 1990s and early 2000s have yet to be solved. David Cass,…
114: Global CISO David Cass continues his discussion in part two of the series with Chief Security Architect Chris Roberts on Acalvio’s threat deception technology
Dec 18, 2016 • 11 min
As you’ll hear in part two of the conversation between David Cass, Global CISO IBM Cloud and SaaS, and Chris Roberts, Acalvio Chief Security Architect, threat detection technology is allowing enterprises to identify intruders quickly. In this…
113: Payment Card Processor Monext Discusses Continuous Compliance, Reducing Complexity and Heightening Security
Nov 29, 2016 • 9 min
Ensuring continuous compliance while reducing complexity is essential to bolstering security for many organizations, in particular, those that process credit card data. In this Tufin-sponsored podcast, IBM’s David Cass talks with Monext’s Laurent…
SC112: David Cass, Global CISO IBM Cloud and SaaS Speaks with Chris Roberts, Acalvio Chief Security Architect, on Threat Deception, the Internet of Things and Technology Innovation
Nov 23, 2016 • 11 min
It’s becoming an old adage: it isn’t a matter of if an attacker will infiltrate your network but when.” With that being the case and with research showing that attackers often reside on an enterprise’s network for many months doing…
111: Matt Hollcraft, Maxim Integrated CISO, Speaks with Dan Schiappa, SVP & GM, Sophos Enduser Security Group on Ransomware, IoT and Hacking as a Business
Nov 4, 2016 • 14 min
In this interview Matt Hollcraft, Maxim Integrated CISO, discusses common threat vectors – what is old and what is new – with Dan Schiappa, SVP & GM, Sophos Enduser Security Group. They talk about ransomware, the mobile workforce, Internet of…
110: David Mahon, CSO of CenturyLink, and David Cass, Global CISO IBM Cloud & SaaS, Discuss the Evolution of the CISO and Provide Tips to Current and Aspiring CISOs
Oct 26, 2016 • 10 min
In this conversation with Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, CenturyLink CSO, talks about the evolution of the CISO role. A seasoned security executive, with experience reporting to…
109: IBM Global CISO Cloud & SaaS and ADP Vice President & Global Security Architect Discuss the Business and Technology Benefits of User Behavior Analytics (UBA) Tools
Sep 26, 2016 • 9 min
The use of user behavior analytics (UBA) is at the forefront of technologies that CISOs are seeking for their security toolkits to help them identify that needle-in-a-haystack. In this podcast sponsored by Exabeam, IBM’s David Cass talks with…
108: David Cass, Global CISO IBM Cloud and SaaS, Speaks with Reuven Harrison, CTO Tufin, on Network Security Policy Automation and Orchestration in the Cloud
Sep 14, 2016 • 12 min
Hybrid Cloud Environments Drive Demand for Automation and Orchestration
107: John Masserini, CSO MIAX Options, Speaks with Barmak Meftah, President and CEO AlienVault, About Threat Detection and Response
Aug 23, 2016 • 13 min
In this conversation, MIAX Options CSO John Masserini discusses the threat detection and response space with AlienVault President and CEO Barmak Meftah. An early adopter of threat intelligence, Masserini notes its challenges and asks Meftah what…
106: David Cass, Global CISO IBM Cloud & SaaS, and David Rooker, CISO Actian Corp, Discuss Today’s Greatest Security Threats
Aug 18, 2016 • 9 min
CISOs talk about the IoT, ransomware, phishing and what can be done
105: Part 3- CISO of IBM Cloud & SaaS Speaks with Spirent on Medical Device and Autonomous Car Hacking
Aug 11, 2016 • 8 min
David Cass and John Weinschenk Discuss the Internet of Things (IoT) and Agile Development
104: David Cass, CISO IBM Cloud & SaaS, and David Mahon, CSO CenturyLink, Discuss the Most Common Threats Hitting Businesses Today
Aug 10, 2016 • 10 min
The Two Executives Talk About Spear Phishing and Ransomware
103:David Cass, Global CISO IBM Cloud & SaaS, and William Okula, Executive Officer Police Technology Bureau at the Suffolk County Police Department, Discuss Today’s Threats, Security Best Practices and Staffing
Jul 20, 2016 • 8 min
In the series brought to you by Security Current and Intersections IT Security ONE2ONE Summit you will hear CISOs discuss today’s most critical issues in IT Security. This episode features David Cass, IBM Cloud & SaaS Global CISO, and William…
102: David Cass, CISO IBM Cloud & SaaS, and Richard Seiersen, GM Cybersecurity and Privacy GE Healthcare, Discuss Security, Trust and Privacy in Healthcare
Jul 13, 2016 • 8 min
This episode features David Cass, IBM Cloud & SaaS CISO, and Richard Seiersen, GE Healthcare’s General Manager Cybersecurity and Privacy who discuss the different types of attack vectors in healthcare, which as you’ll hear is “As Security as…
101: CISOs David Cass, IBM Cloud & SaaS, and Jonathon Neel, University of Virginia School of Medicine, Discuss the Changing Threat Landscape in Healthcare
Jul 6, 2016 • 9 min
In the series brought to you by Intersections IT Security ONE2ONE Summit and Security Current you will hear CISOs discuss today’s most critical issues in IT Security. This episode features David Cass, IBM Cloud & SaaS CISO, and Jonathon…
100: Part 2 CISO of IBM Cloud & SaaS Speaks with Spirent on Risk, Remediation, Testing and Technology
Jun 28, 2016 • 11 min
In part two of the conversation David Cass, IBM cloud & SaaS global CISO and John Weinschenk, Spirent Communications general manager enterprise and network application security, discuss managing risk. In this Spirent sponsored podcast they talk…
99: CISO David Cass Speaks to Spirent Communications on IoT, Ranswomware and More
Jun 21, 2016 • 11 min
CISOs can never reduce risk to zero. As technology development increases at a lightning speed with the Internet of Things (IoT) bringing more Internet-enabled devices daily and the cloud becoming more pervasive, what can and should be done? CISO…
98: David Cass, IBM Cloud & SaaS CISO, Speak with James Beeson, GE Capital America CISO, on the Changing Nature of Attacks
Jun 13, 2016 • 12 min
Cass & Beeson Discuss the Increase in More Destructive Attacks & Today’s Bad Actors
97: CISO David Cass, IBM Cloud & SaaS, and David Hahn, Hearst CISO, Talk Security Challenges Facing Media Corporations
Jun 8, 2016 • 10 min
Intersections IT Security ONE2ONE Summit Series in Conjunction with Security Current
96: IBM Cloud & SaaS CISO Speaks with Deloitte’s CISO on Security and the Convergence of Technologies
May 27, 2016 • 16 min
In today’s digital age, there are more connected devices than ever before. A look at the history of the digital universe shows that, like the real universe, it is expanding. From a single device meeting our needs—starting with the PC, then moving…
95: Cloud Security Alliance Talks Challenges, CISO and Other Trends
Mar 15, 2016 • 9 min
Security Current speaks CSA Chief Technology Officer Daniele Catteddu
94: Security Shark Tank Vendor Spotlight: Skyport Systems
Mar 8, 2016 • 14 min
Secure Computing Infrastructure for Enterprise Applications Provider Skyport Systems
93: Security Shark Tank Vendor Spotlight: Tempered Networks
Mar 8, 2016 • 10 min
Secure Connectivity Provider Tempered Networks Explains Their Solution
92: Security Shark Tank Vendor Spotlight: Spikes Security
Mar 8, 2016 • 9 min
Web Browser Isolation Technology Provider Spikes Security Explains Their Solution
91: Security Shark Tank Vendor Spotlight: Pwnie Express
Mar 7, 2016 • 12 min
Wired and Wireless Threat Detection Provider Pwnie Express Explains Their Solution
90: Security Shark Tank Vendor Spotlight: Interset
Mar 7, 2016 • 11 min
User Behavior Analytics Provider Interset Explains Their Solution
89: Security Shark Tank Vendor Spotlight: GuardiCore
Mar 7, 2016 • 10 min
Real-time Breach Detection and Response Provider GuardiCore Explains Their Solution
88: Security Shark Tank Vendor Spotlight: ProtectWise
Mar 7, 2016 • 11 min
SC 88: Security Shark Tank Vendor Spotlight: ProtectWise Cloud Network DVR Provider ProtectWise Explains Their Solution
87: Security Shark Tank Vendor Spotlight: Exabeam
Mar 7, 2016 • 10 min
User Behavior Analytics Provider Exabeam Explains Their Solution
86: Social Media and Cyberterrorism - A Conversation with Cybercrime Expert Morgan Wright
Feb 16, 2016 • 15 min
Morgan Wright is an internationally recognized cybersecurity, cyberterrorism and identity theft expert. He’s testified in front of congress, advised the U.S. State Department and served in law enforcement. In this conversation with…
85: Security and Network Access Control at Barnabas Healthcare
Feb 10, 2016 • 11 min
With vast amounts of personal information and Internet-enabled medical equipment, health care faces unique security requirements. Some are a result of regulatory mandates such as HIPAA while others are because of the critical clinical equipment…
84: Of Encryption and Backdoor Access - A Conversation with a CISO
Jan 29, 2016 • 9 min
Encryption is fundamental to business today. But encryption also allows evildoers to plan nefarious criminal or terrorist acts. Law enforcement, intelligence agencies and political interests have proposed “back doors” to enable them to do their…
83: Bug Bounty Programs: Trends in Developing Secure Software with SANS John Pescatore
Jan 13, 2016 • 10 min
In the push to launch mission critical applications, insecure software often makes it into production. Sometimes hackers find the gaps and exploit vulnerabilities. Now new approaches are leading to continuous vulnerability testing - by…
A CISO Looks at Where We Go From Here in Information Security?
Dec 29, 2015 • 14 min
Roota Almeida of Delta Dental of New Jersey Talks To Security Current
81: Addressing the Growing Cybersecurity Threat in 2016 with Jason Witty, U.S. Bancorp CISO
Dec 22, 2015 • 13 min
The overall cost of cyber crime in 2015 to the world economy as a whole was estimated at a conservative $575 billion, according to research. Breaches are growing in number and sophistication. According to Jason Witty, Executive Vice President and…
80: Hurdling Obstacles to Security Training and Awareness Success
Nov 30, 2015 • 8 min
Things happen. Staffers click links they shouldn’t. Interlopers enter the workplace, gain access to a vacant desk, log in and steal corporate secrets. Technology helps, but end user security awareness training puts people on the front line…
79: Software Defined Perimeters
Nov 5, 2015 • 6 min
In a world of three letter acronyms comes yet another — a new specification from the Cloud Security Alliance. SDP or Software Defined Perimeter. SDP approaches are meant to create a secure micro segment between the user and a host. But how are…
79: CISO Buying Trends, Approaches and Considerations
Oct 27, 2015 • 10 min
A conversation with Gartner’s Perry Carpenter
Creating and Managing a Security Aware Culture
Oct 20, 2015 • 8 min
A Conversation with Gartner Research Director Perry Carpenter
76: The European’s “Safe Harbor” Provisions are Invalid. So What?
Oct 14, 2015 • 6 min
Attorney Lawrence Dietz Explains what this means to CISOs
74: Management Hierarchy and CISO Reporting Roles – Part 2 with CISO Brian Lozada
Sep 16, 2015 • 10 min
What is the optimal structure within an enterprise in terms of CISO reporting? Should a CISO report to the CIO? Or possibly to the CFO? In some cases, as you’ll hear in part two of Vic Wheatman’s interview with CISO Brian Lozada,…
73: Information Security in Hedge and Private Equity Funds - Part 1
Sep 8, 2015 • 7 min
Information security in hedge funds is new and many hedge funds don’t know what cybersecurity is or what is at risk. And there are unique security issues specifically related to hedge funds. With a high risk/reward mentality, and with…
72: Vetting Security Startups — Venture Capital Series Part 3
Aug 31, 2015 • 13 min
How can CISOs differentiate among “me too” information security startups? What is the role of incubators and are they useful in helping new security companies get started? And how is the NSA considered one of the best “graduate schools” in…
71: What Happens When Your Security Vendor is Acquired –Venture Capital Series Part 2
Aug 18, 2015 • 13 min
One of the primary exit strategies for security startups is to be acquired. Sometimes that’s a good thing, other times, not so much. Hear about some of the issues associated with acquisitions and where startups added value to a security platform or…
70: Security Shark Tank Quick Hits
Aug 13, 2015 • 14 min
Security Startups Get In Front of Leading CISOs
70: Experience Matters for Security Startups - Venture Capital Series Part 1
Aug 10, 2015 • 8 min
The level of venture capital financing has hit new heights with increasing investments in information security. Some venture capitalists (VCs) specialize in finding and funding startups in security, which is a unique segment…
69: Anton Chuvakin on the Operational Effectiveness of Security Analytics
Jul 28, 2015 • 9 min
How effective are Security Analytics tools and how do you compare their operational effectiveness? After spending months researching this subject, Gartner’s Dr. Anton Chuvakin says the long and short is that they just don’t know how well the tools…
68: DataStealth from Datex, Inc.- Transforming Sensitive Information Securely
Jul 23, 2015 • 12 min
It no longer is will an intruder will gain access to your network, it is just a matter of when they will gain access. Cybersecurity company Datex, Inc. says employees will make mistakes, user credentials will be compromised, data theft will…
67: Cloud SIEM Doesn’t Really Exist - Yet
Jul 20, 2015 • 7 min
SIEM stands for Security Information and Event Management. SIEM is continuing to grow in usage but where does it stand in terms of cloud deployments and what is its cloud-based market share? Gartner’s Dr. Anton Chuvakin challenges the idea that one…
66: Using User Behavior Intelligence To Identify Account Takeovers
Jul 14, 2015 • 6 min
Massive database breaches have resulted in millions of user identification and authentication profiles being compromised. Identifying unauthorized attempts to access systems or accounts is a basic requirement for financial institutions, etailers,…
65: Changing User Behavior Through Security Education
Jul 10, 2015 • 5 min
With experts citing employees being compromised by attackers as a primary cause of security breaches, many enterprises are seeking new training methods. Spun out of Carnegie Mellon University, Wombat Security takes what it says is a different…
64: Overcoming Silos Between Security and Privacy
Jul 6, 2015 • 19 min
For organizations to achieve maximum privacy and security the two need to go hand-in-hand but unfortunately they are often siloed within organizations. So how are organizations evolving to incorporate privacy, risk and compliance to address…
63: Gartner’s Anton Chuvakin On the Failure of Security Policies
Jun 29, 2015 • 10 min
Many security policies are aspirations, doomed to fail because they are unrealistic. Not only can they be unachievable, but may in fact encourage people to disregard policies because, after all, “we can’t really do that.” Further, enterprises…
62: Augmenting the Past with Network Forensics
Jun 5, 2015 • 8 min
Most “new” security technologies use functions and features developed years ago. Network Forensics applies machine learning, automating detection functions via machine-based analytics to decode and visualize relevant metadata. Accordingly,…
61: An Information Security Officer’s Deep Thoughts
Jun 1, 2015 • 2 min
In this interview with an information security officer who prefers to remain anonymous we discuss the definitions of security intelligence, what it takes to be a CISO and the toughest part about heading up security at an enterprise. He…
60: The Role of the CISO with Daniel Conroy, Synchrony Financial
May 18, 2015 • 12 min
As the news of breaches across multiple sectors continues the role of the Chief Information Security Officer (CISO) has never been more important. The CISO is not only responsible for protecting the organization they are tasked with enabling the…
59: Breach Detection with Seculert
May 15, 2015 • 3 min
It isn’t a matter of if your organization will be infected with malware but rather a matter of when. Based on that premise, Seculert designed a cloud service to quickly and automatically identify the machines connected to bad actors on the Internet….
58: A CISO Talks Security in Healthcare
May 11, 2015 • 8 min
Healthcare providers have some of the most complicated environments with a multitude of systems, users and regulatory mandates. And often, according Barnabas Health CISO Hussein Syed, this leads to one of the biggest challenges, which is a…
A CISO Reviews RSA 2015: Patricia Titus
May 6, 2015 • 4 min
RSA Conference 2015 was bigger than ever with hundreds of startups promoting their wares. One segment that caught the attention of CISOs was what is being dubbed as next generation endpoint security. As you’ll hear, new approaches to endpoint…
56: The State of Cyber Security: Implications for 2015
May 5, 2015 • 7 min
Vic Wheatman Speaks with Eddie Schwartz of ISACA
55: Next Generation Endpoint Protection
May 1, 2015 • 5 min
Vic Wheatman speaks with SentinelOne
Gartner Analyst on the Bus - Security Budgets Up as Staffing Down
Apr 30, 2015 • 4 min
Vic Wheatman Talks to Gartner Analyst Greg Young
53: The New Perimeter is Around the Cloud: CYREN Annual Report Details Latest Threats
Apr 29, 2015 • 14 min
Some 2.5 billion emails containing malware were sent in 2014. Malware URLs are on the rise. Phishing URLs are on the rise. And according to CYREN’s 2015 Cyber Threats Yearbook it doesn’t appear that attackers will be letting up any time soon. The…
52: Protecting Against Targeted Corporate Email Attacks
Apr 27, 2015 • 9 min
Phishing, Spear Phishing, and Social Media Attacks; What Can You Do?
51: Tempered Networks: Addressing TCP/IP Vulnerabilities
Apr 14, 2015 • 10 min
Security Current Security Shark Tank Sponsor Talks to VIc Wheatman
50: Security Analytics: Buy or Build
Apr 7, 2015 • 9 min
How big a market is Security Analytics? If you ask our guest, Gartner Research VP Dr. Anton Chuvakin you’ll hear that there actually is no specific or defined market called Security Analytics. He says that while there are technology providers offering…
49: A Five-time CISO on Attacks, Security Personnel Shortages and More
Mar 25, 2015 • 8 min
Five-time CISO Jeff Klaben, who is currently at a Silicon Valley think tank and also is an adjunct professor, says there is a shortage of skilled security professionals, especially at the management level, to combat an increasingly complex…
48: Automotive Security and the Car of the Future
Mar 23, 2015 • 7 min
Imagine a future when cars are no longer controlled by the driver. With automatically controlled cars coming “just around the corner” and with more automation features being introduced there are concerns that vehicles might be vulnerable to security…
47: Cloud Security Monitoring, Cloud Access Security Brokers and MSSPs
Mar 4, 2015 • 7 min
Monitoring new cloud environments for adequate security is challenging, particularly when trying to determine which approach might be best. Most Managed Security Service Providers (MSSPs), while “out there” in someone else’s data center,…
46: Addressing a Critical Vulnerability Management Problem
Mar 2, 2015 • 8 min
Scanning a network, devices or applications for security vulnerabilities may not tell the whole story or even tell the true story. IP addresses and host names are a moving target, constantly changing. This leads to frustration and…
45: The Security Hits Keep Coming
Feb 24, 2015 • 7 min
Some research suggests that 97 percent of organizations are already compromised, according to former Gartner analyst Eric Ouellet. And according to Ouellet the hackers are smarter and more persistent than ever, often having a better understanding of…
44: FBI Views on Cybersecurity
Feb 18, 2015 • 11 min
The recent US Presidential Directive along with White House statements on cybersecurity have brought new energy to law enforcement approaches against cybercrime. Sharing threat data within the public and private partnership is…
43: The City of San Diego’s CISO Talks About Security & Innovation
Feb 11, 2015 • 14 min
You wouldn’t think that innovation and city government go hand in hand but in The City of San Diego that is precisely the case. In this conversation with Vic Wheatman, the city’s CISO Gary Hayslip discusses how the City of San…
42: Emerging Deception Techniques, Technologies and Tools
Feb 3, 2015 • 6 min
There’s a desire to “get back” at infrastructure attackers through offensive deception techniques. Products are just emerging designed to lead the bad guys into worthless, time-wasting activities to minimize the damage they can cause. But there are…
40: Aviation Security: Who’s Watching Out for Us?
Jan 27, 2015 • 8 min
The aviation industry is a pillar of critical infrastructure and the industry is very complicated. It has cargo, passenger, military and leisure components with an overlay of complex communications systems. Networks connect all of the information yet…
40: A Small Company Takes on the Devil Inside the Beltway
Jan 6, 2015 • 19 min
LabMD processes medical specimens. One day, a security services company emailed them advising that its patented searching software, which looks for problems caused by peer-to-peer applications, found a file with sensitive information. The security…
39: Legal Issues with BYOD
Dec 29, 2014 • 7 min
With Bring Your Own Device (BYOD) increasing in the workplace, the question arises of employer and employee rights governing the use of these employee-owned tablets, laptops, smartphones and other personal devices. What are the rights when these…
38: Where Are the New Security Professionals Coming From?
Dec 15, 2014 • 11 min
Vic Wheatman speaks with John Pescatore
37: How History Impacts Security Around the World
Dec 9, 2014 • 8 min
It takes a village to build a secure world. Privacy and security are intertwined. But approaches in America are subtly different than approaches taken in Europe. Americans often approach security from an infrastructure perspective while Europeans…
36: Securing the API Economy: A CISO Tutorial
Dec 3, 2014 • 9 min
With the increase in APIs, and in particular usage with REST-based architecture, developers need to rethink how they secure them. So what should CISOs know about securely developing new mobile, Internet of Things (IoT) or cloud-based…
35: A Secure Internet of Things Ecoysystem
Nov 21, 2014 • 7 min
As the Internet of Things (IoT) evolves security is often an afterthought. One of the greatest challenges facing IoT project teams is ensuring the communications links are secure. securitycurrent’s Vic Wheatman speaks with PubNub CEO Todd Greene on…
34: PKI and Securing the Internet of Things
Nov 17, 2014 • 11 min
Whatever happened to public key infrastructure (PKI)? Despite rumors of its demise, PKI is not dead! However, it has essentially disappeared into the applications, processes and products it is now protecting. The current iteration of PKI is being…
33: Smart Carpets and Cheney’s Heart
Nov 11, 2014 • 12 min
A CISO in Healthcare Looks at the Security of Things
32: Information Sharing Among Security Executives
Nov 6, 2014 • 9 min
The relationship between risk, compliance and information security
31: An Interview with the First CISO, Steve Katz Formerly of Citigroup
Oct 30, 2014 • 12 min
Part 1 of a two-part series
30: Securing Embedded Systems on the Internet of Things
Oct 23, 2014 • 10 min
Embedded systems, the Internet of Things and security. What do these three things have in common?Once in use industrial, medical, avionics and other systems typically don’t get upgraded, but they need to operate in a safe and trusted manner. But in…
29: Overcoming Security Silos
Oct 22, 2014 • 10 min
The drumbeat of breaches — Home Depot, Target, Jimmy John’s and the list goes one — continues almost daily. Why is this the case? It doesn’t appear to be a lack of security investment or governance. As you’ll hear from one former Gartner analyst…