Preview Mode Links will not work in preview mode

Real-world conversations with top security execs. Prepare to be enlightened, engaged, perhaps challenged & definitely informed while getting to know the pros responsible for it all.

Mar 31, 2014

How valuable is data visualization in spotting patterns on attacks on individuals, institutions or locations? 

Understanding what is going on in this realm can help organizations protect themselves against organized cyber criminals, rogue intelligence agencies (or not so rogue possibly), and malevolent nation...


Mar 26, 2014

The Ability to See All the Things: Vulnerability Assessment and Pentesting.

What security vulnerabilities are you not seeing in your remote facilities or branch offices? Are you the next Target?

Dubbed a hack-in-the-box, Pwnie Express leverages the same open source tools used by hackers to provide enterprises visibility...


Mar 21, 2014

What is tokenization? 

How does tokenization compare to encryption and format preserving encryption?

Are there performance issues regarding its use?

Is it standardized so one solution can exchange tokens with a different implementation?

Vic Wheatman talks to Voltage CTO Terrence Spies who urges enterprises to look at...


Mar 18, 2014

Security and the Internet of (Every)Thing.

How are data and communications going to be protected as CPUs and Near Field Communication chips become less expensive and are embedded in to the Internet of (Every)Thing?

What are some of the leading edge indicators and social trends that will drive the need?

securitycurrent's...


SC 006: Security and the Internet of Things

Mar 18, 2014

Security and the Internet of Things.

How are data and communictions going to be protected as CPUs and Near Field Communications chips become less expensive and are imbedded in to the Internet of (Every) Thing? 

What are some of the leading edge indicators and social trends that will drive the need?

securitycurrent's...