Preview Mode Links will not work in preview mode

The Security Current Podcast features CISO-led interviews with industry thought leaders about key challenges, best practices and innovative approaches to information security, risk and privacy.

Mar 31, 2014

How valuable is data visualization in spotting patterns on attacks on individuals, institutions or locations? 

Understanding what is going on in this realm can help organizations protect themselves against organized cyber criminals, rogue intelligence agencies (or not so rogue possibly), and malevolent nation...


Mar 26, 2014

The Ability to See All the Things: Vulnerability Assessment and Pentesting.

What security vulnerabilities are you not seeing in your remote facilities or branch offices? Are you the next Target?

Dubbed a hack-in-the-box, Pwnie Express leverages the same open source tools used by hackers to provide enterprises visibility...


Mar 21, 2014

What is tokenization? 

How does tokenization compare to encryption and format preserving encryption?

Are there performance issues regarding its use?

Is it standardized so one solution can exchange tokens with a different implementation?

Vic Wheatman talks to Voltage CTO Terrence Spies who urges enterprises to look at...


Mar 18, 2014

Security and the Internet of (Every)Thing.

How are data and communications going to be protected as CPUs and Near Field Communication chips become less expensive and are embedded in to the Internet of (Every)Thing?

What are some of the leading edge indicators and social trends that will drive the need?

securitycurrent's...


SC 006: Security and the Internet of Things

Mar 18, 2014

Security and the Internet of Things.

How are data and communictions going to be protected as CPUs and Near Field Communications chips become less expensive and are imbedded in to the Internet of (Every) Thing? 

What are some of the leading edge indicators and social trends that will drive the need?

securitycurrent's...