Industry


April 22, 2014

By Richard Stiennon

Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even Next Generation Firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined.


April 21, 2014

By Richard Stiennon

The Ponemon Institute published a survey earlier this year on incident response readiness. 

Out of 674 qualified respondents an amazing 57% felt that their organizations would suffer a material breach in the next twelve months. Only one third had invested in improving their incident response capability. 


April 19, 2014

By Richard Stiennon

In a recent post I discussed trust interfaces as a method of evaluating and improving security strategies. One of those trust interfaces is with employees, or more broadly, insiders.


April 18, 2014

By Richard Stiennon

Commtouch has been in stealth mode for 20 years. Industry veterans know that many of the endpoint security suites, UTM devices, and even cloud services make use of Commtouch for URL content filtering, spam filtering, and malware detection.


April 18, 2014

By Richard Stiennon

When Boeing acquired Narus in 2010, it was one of the few acquisitions of a Silicon Valley IT security company by a major defense contractor. At the RSA Conference 2014 I caught up with Narus President John Trobough.


April 18, 2014

By Richard Stiennon

Marty Roesch is a pioneer in network security. He is the creator of the open source IDS product SNORT and commercialized it under the SourceFire brand. Over the years he had a front row seat to the changing threat environment.


April 15, 2014

By Richard Stiennon

As malware become both more sophisticated and more targeted traditional AV began to fail. It has been a decade since large enterprises began to complain that their AV vendors would not add signatures to their signature files for unique malware that was discovered on their network. Why, after all, should an AV company create a signature for a virus that no one else would ever need?


April 7, 2014

By Richard Stiennon

As networks have grown and network security device deployments have skyrocketed, it has become much more difficult to manage the policies that go along with those devices. 


March 27, 2014

By Mike Saurbaugh

“We wanted to make a difference”, said StreetCred co-founder and CEO, Nick Selby. Selby, a long-time figure in the information security industry was sworn in as a Dallas-area police officer in 2010. Selby first met in 2008 with co-founder and veteran police officer, Dave Henderson, who has nabbed over 600 violent felony criminals in more than 15-years in law enforcement.


March 6, 2014

By Gail Bronson

Both early stage and longstanding security vendors jockeyed for position in the evolving network security space at the RSA 2014 security conference. Companies including Narus, FireEye, Cyphort and Securonix, along with Fortune 500 companies such as Hewlett-Packard, demonstrated and discussed their newest security solutions.


Page 3 of 4 : First   1 2 3 4 Last

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter