Articles by Richard Stiennon On Security Trends


September 2, 2014

By Richard Stiennon

As summer is drawing to an end many IT security professionals are returning to their desks after vacations and trips to drop freshmen off at their new schools. A quick check of emails, Twitter, Facebook, and news sites will reveal that insecurity never sleeps nor vacations.


August 26, 2014

By Richard Stiennon

This is so different I had to write about it. Fortinet has had a very successful business in the distributed enterprise space with its line of UTM (Unified Threat Management) devices for a decade.


August 26, 2014

By Richard Stiennon

Michael Daniel, the White House Cyber Policy Coordinator,  created a disturbance in the force last week when he was quoted as saying: "Being too down in the weeds at the technical level could actually be a little bit of a distraction." 


August 18, 2014

By Richard Stiennon

In the wake of the high watermark breach that occurred at Target, there is more pressure on boards and senior executives to understand the threats they face on the cyber front. CEOs cannot help but ask “could we too suffer such a breach?”  In addition to that all-important question here are eight more questions that should be posed to the CISO.


August 13, 2014

By Richard Stiennon

We all knew it was coming. As more and more networks are created and the IP address space is subdivided more and more the global routing table that backbone routers have to store in memory grow. 


August 12, 2014

By Richard Stiennon

This is an update to the article  about identifying LinkedIn scammers when they request a connection. In that article we listed six ways to identify fake accounts:


August 11, 2014

By Richard Stiennon

NetScout, a vendor of network management tools, has filed a suit against Gartner claiming that Gartner has a "pay-to-play" business model. The suit states that Gartner made false and defamatory statements regarding NetScout, causing substantial injury to NetScout.

It says that NetScout suffered the consequences based on its placement in Gartner's latest Magic Quadrant (MQ) report Network Performance Reporting and Diagnostics (NPMD) published in March. 


August 7, 2014

By Richard Stiennon

Way last April, a time when the world seemed a more peaceful place, Leon Panetta and Richard Clarke were quoted warning of impending Russian cyber attacks in the wake of an escalating response from the West to Russia’s intransigence in the Ukraine.


August 3, 2014

By Richard Stiennon

This past February I participated in an amazing three day innovation and ideation lab pulled together by Farnam Jahanian, Assistant Director, Directorate for Computer and Information Science and Engineering, National Science Foundation (NSF), with a lot of help from an organizing committee drawn from some of the most intelligent technology people around.


July 31, 2014

By Richard Stiennon

According to a report in Foreign Policy, former NSA head Keith Alexander has ideas. Ideas he wants to patent and turn into a business.  Admittedly, Alexander has had exposure to countering network borne attacks. 


Page 1 of 10 : First   1 2 3 4 5 6 7 8 9 10 Last

About securitycurrent | Privacy Policy | Subscribe to our newsletter