Top News:

Approaching the Singularity in Situational Awareness

By Chris Blask

The gravity well of situational awareness has been pulling on us since the earliest days of information protection.

The ever-increasing sophistication of threats and compounding complexity of our systems is accelerating us down that path and narrowing our options. As we approach this singularity the choice to continue flying blindly through cyberspace is rapidly becoming nothing less than foolhardy.

Savvy travelers will plan accordingly.

                                                                     Read More  

Music and Cybersecurity Defect Detection

By Tim Kropp

If you have ever sat through an orchestral concert, you would hear the first chair oboe playing a single note for the rest of the fellow orchestral players to latch onto and begin the process of fine tuning. 

At first, it is a single A440 resonating on stage, followed section by section, strings, brass, percussion, until a cacophony of sound begins to reverberate from all players. 

They do this because they can. They do this because the lack of tonal harmony would result in a less than spectacular performance and likely some very unhappy customers and critics of music performance.

Your desired Cybersecurity practice can be your A440.

                                                                     Read More 


How Not to Gamble with Your IT Security Strategy

By Christine Vanderpool

It's no secret that I love Las Vegas and all it has to offer including gambling.

To me, this is a natural affection due to what I do in my day-to-day life. Isn't that what we as IT Security professionals do every day, gamble? But instead of gambling with our own money or chips, we are betting our company's money and name.

Gambling by someone who knows what they are doing is not a game of chance but a game of knowing and playing the odds. It is about taking the right calculated risk at the right time with of course a little bit of luck.

Read More 


Security Current eBook:  A CISOs Guide to Principles of Data Privacy and Security 

By David Sheidlower 

A CISOs Guide to Principles of Data Privacy and Security examines the key issues surrounding data privacy and security.

In this eBook, Sheidlower, currently CISO of an international media and advertising firm, provides his perspective on topics, which include privacy policies, big data, consent, governance and security.

According to the author: “The fundamental principles of privacy and security continue to evolve.  I’ve tried to look into each of them from the consent process, which most people find problematic, to the need for a framework for data protection, which is where an organization’s security program comes in.”

The eBook has been lauded by Sheidlower’s peers, with Larry Whiteside Jr., CISO of the Lower Colorado River Authority (LCRA), stating: “It provides thought provoking and actionable information on issues that are top of mind for us – data privacy and security. I highly recommend reading it.”

Download Now 

Security Current's High Stakes

Chief Information Security Officers (CISOs) are dedicated to protecting enterprises and government organizations.

But with the drumbeat of attacks getting louder and more frequent and the number of security technology companies continuously increasing how do CISOs decide what to use?  

This is a unique opportunity for security companies to present their technologies to accomplished security executives on the front line. 

The security companies have the chance to convince the CISOs to select their technologies.

It's sink or swim.

Find Out More 

Security Current's Vic Wheatman speaks with Jeff Hussey, founder and CEO of Tempered Networks, one of the participants in this sponsored podcast on why present in this forum.

                                                                                                Listen Now! 


CISOs - Maintaining the Vision

A practitioners tips on being a successful leader


My Parents Taught Me to Share So What's the Big Deal?

Sharing information on cyber threats 


Audited and Jaded 

Are technical audits effective? 


Risk Averse. Rule Averse.

How bias can impact how a security program works

Security Analytics: Buy or Build 

Vic Wheatman Speaks with Gartner's Dr. Anton Chuvakin

How big a market is Security Analytics? If you ask our guest, Gartner Research VP Dr. Anton Chuvakin you'll hear that there actually is no specific or defined market called Security Analytics. He says that while there are technology providers offering products or services so labeled they all do somewhat different things in different ways. 

There are vendors who look at packets, others that look at logs or roles and those that look at malware among other things and they all carry a label of analytics but according to Dr. Chuvakin the fact that all of the vendors do different things in different ways indicates that there is no market that you can just go to and buy a security analytics product. 

Listen Now 

Path to a Career in Cyber and Key Tools - Part Three

By Gary Hayslip

In this last discussion we will cover some educational sites and a couple of sites that have useful tools that I have used over the years to recertify or increase my knowledge of new technologies.

We will start with education sites. I am first going to list some adult education sites located here in San Diego as examples of schools where you can go to work on a certification or learn a new skill.

I have found many of these two-year colleges and adult education facilities to have excellent labs for working for example on Cisco certifications or the latest Network/Cloud Security certifications. So let’s take a look at a couple of such organizations in San Diego, and similar ones in your area and see what courses they offer.

Read More 


About securitycurrent | Privacy Policy | Subscribe to our newsletter