The securitycurrent Podcast
Listen to Victor Wheatman's conversations with practitioners, experts and analysts.
Stay tuned as we roll out the latest episodes which were recorded at the RSA conference and include executives from Trend Micro, Hytrust and other security companies on the latest trends.
By Bob Tarzey
Sometimes technology areas that once seem distant converge. We'll look at the convergence in the IT security space of SIEM and IT forensics which is driven by the growing volume of security data and the ability to make use of it in real time.
By Randy Marchany
You know you've reached a point in your career when you get asked to give a talk on how IT has evolved over the past 10-15 years. I guess it's a polite way of saying you've been around for some time in the industry. Well, I was asked to do such a talk on security.
By Richard Stiennon
The next wave of security spending is going to be on counter-surveillance. Encryption, key management and cyber defense spending will drive growth. By 2023 I predict IT security spending, globally, will exceed $600 billion. That is not a bubble, it is a boom.
By Mike Saurbaugh
Security awareness solution providers continue to draw interest as interest has increased by companies seeking to do more than just check a compliance box. So who are the security awareness vendors? We take a look.
Security in the academic world.
The demise of Net Neutrality standards.
The sensitive data protection problem.
By Bob Tarzey
Web users rely on secure sockets layer (SSL) on a regular basis without having to know what it is or even if it is securing their transactions in the background.
Without SSL there would have been no Internet banking, no e-commerce, no Internet revolution.
By Fahmida Y. Rashid
The global cybersecurity market will reach $120.1 billion by 2017, according to a new forecast from market research firm Markets to Markets.
The firm's report focuses on a wide array of technology and solutions used to defend against cyber-attacks, and includes the following: identity and access management (IAM), unified threat management (UTM), risk and compliance management, data encryption, data leakage prevention, data recovery, antivirus, intrusion prevention and/or detection, web filtering, firewalls and vulnerability management.