April 19, 2014

By Richard Stiennon

In a recent post I discussed trust interfaces as a method of evaluating and improving security strategies. One of those trust interfaces is with employees, or more broadly, insiders.

April 18, 2014

By Richard Stiennon

Commtouch has been in stealth mode for 20 years. Industry veterans know that many of the endpoint security suites, UTM devices, and even cloud services make use of Commtouch for URL content filtering, spam filtering, and malware detection.

April 18, 2014

By Richard Stiennon

When Boeing acquired Narus in 2010, it was one of the few acquisitions of a Silicon Valley IT security company by a major defense contractor. At the RSA Conference 2014 I caught up with Narus President John Trobough.

April 18, 2014

By Richard Stiennon

Marty Roesch is a pioneer in network security. He is the creator of the open source IDS product SNORT and commercialized it under the SourceFire brand. Over the years he had a front row seat to the changing threat environment.

April 15, 2014

By Richard Stiennon

As malware become both more sophisticated and more targeted traditional AV began to fail. It has been a decade since large enterprises began to complain that their AV vendors would not add signatures to their signature files for unique malware that was discovered on their network. Why, after all, should an AV company create a signature for a virus that no one else would ever need?

April 7, 2014

By Richard Stiennon

As networks have grown and network security device deployments have skyrocketed, it has become much more difficult to manage the policies that go along with those devices. 

March 27, 2014

By Mike Saurbaugh

“We wanted to make a difference”, said StreetCred co-founder and CEO, Nick Selby. Selby, a long-time figure in the information security industry was sworn in as a Dallas-area police officer in 2010. Selby first met in 2008 with co-founder and veteran police officer, Dave Henderson, who has nabbed over 600 violent felony criminals in more than 15-years in law enforcement.

March 6, 2014

By Gail Bronson

Both early stage and longstanding security vendors jockeyed for position in the evolving network security space at the RSA 2014 security conference. Companies including Narus, FireEye, Cyphort and Securonix, along with Fortune 500 companies such as Hewlett-Packard, demonstrated and discussed their newest security solutions.

March 5, 2014

By Fahmida Y. Rashid

Verizon Communications Enterprise Solutions last week launched a new Verizon Cyber Intelligence Center (VCIC) to offer organizations advanced incident response and detection capabilities.

March 1, 2014

By Linda Musthaler 

Two months since the news of the massive Target breach broke, reports are starting to reveal bits and pieces of how the perpetrators were able to get a foothold inside Target’s point of sale system to steal tens of millions of customer account records. In time, there will be a complete forensic analysis of the breach, with lessons for every IT security professional to take back to their own workplaces.

Page 3 of 4 : First   1 2 3 4 Last

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter