News


September 19, 2017

By Aimee Rhodes

Aqua Security has announced that it closed $25 million in a Series B round led by Lightspeed Venture Partners with existing investors TLV Partners , Microsoft Ventures and Check Point co-founder Shlomo Kramer taking part, bringing the total investment in the virtual container company to $38.5 million


September 5, 2017

By Linda Musthaler

Israeli startup Axonius today announced $4 million in seed funding from YL Ventures, with participation from Vertex Ventures and Emerge Capital.


July 4, 2017

Chief Information Security Officers (CISOs) select cybersecurity innovator for its vision

Security Current, the premier information and collaboration community by CISOs for CISOs, named Verodin the winner of its Security Shark Tank® New York City competition. The event brought security solution providers face-to-face with potential buyers.


May 13, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

In the wake of the massive ransomware attack which hit the UK’s NHS, and tens of thousands of businesses and individuals across Europe and the rest of the world, an attack which may have cost lives, but certainly cost millions of dollars, pounds, Euro, and bitcoin, one question looms over all others. At least to lawyers. Others may ask, “how did this happen?” or “who is responsible?” or “how do I prevent this in the future?”  But lawyers ask (or are asked) “can I sue?”  


May 12, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

We all know that the most recent and pernicious forms of phishing attacks are ransomware attacks. They are increasing in scope and incidence, as well as impact and cost.  

But a more disturbing trend is that healthcare entities are being targeted for such ransomware attacks. The most recent is the massive ransomware attack against the UK’s NHS, whereby attackers demanded cyber payments in return for releasing heathcare information from its ravages.


May 12, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

On May 10, the President released his Executive Order on Cybersecurity.  The comprehensive document is intended to set out the national strategy for ensuring that the Internet is used to promote national values, that it is secured against attack from inside and outside, and to promote national interest in security and security technology.  

The Executive Order prioritizes domestic software, databases and technologies over foreign data, and recognizes the need to create, promote and encourage the use of domestically produced encryption technology, particularly for federal agencies and departments and domestic banking and financial services companies.  


April 11, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

The law reflects our values, and our power structure. When Kentucky physician David Dao was dragged off a United Airlines (UAL) flight by Chicago Aviation Police, most people saw outrageous conduct by the airline and possibly the police department.  

Some saw an uncooperative passenger refusing to quietly exit a plane. What you see depends on how you feel about the situation. Nevertheless, there is no doubt that the incident was a public relations nightmare for United, exacerbated by its weak and somewhat feckless response to the hullabaloo. Correct response? A tweet that says, OMG! 


April 6, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

The cops may be reading your private Facebook posts to a friend.  And you may never know about it or be able to do anything about it.  And your friend may never know about it or be able to do anything about it. And, as a result of a New York State court decision on April 5, Facebook may not be able to do anything about it.  


April 3, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

With the repeal of the FCC rules on broadband privacy and security, there’s been a lot of misinformation floating around the web. Here’s my attempt to clarify some of the issues.


March 29, 2017

By Mark Rasch
Attorney and Cybersecurity Expert 

On March 28, 2017, the United States Congress voted to repeal regulations issued by the FCC which would have required Internet Service Providers to obtain the consent of their customers before they could sell their information. Currently, if you visit a website like Facebook, Twitter, or Google, the website collects the fact that you have visited, and what you did on that site.  


Page 1 of 27 : First   1 2 3 4 5 6 7 8 9 10 Last

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter