Mar 31, 2014
How valuable is data visualization in spotting patterns on attacks on individuals, institutions or locations?
Understanding what is going on in this realm can help organizations protect themselves against organized cyber criminals, rogue intelligence agencies (or not so rogue possibly), and malevolent nation...
Mar 26, 2014
The Ability to See All the Things: Vulnerability Assessment and Pentesting.
What security vulnerabilities are you not seeing in your remote facilities or branch offices? Are you the next Target?
Dubbed a hack-in-the-box, Pwnie Express leverages the same open source tools used by hackers to provide enterprises visibility...
Mar 21, 2014
What is tokenization?
How does tokenization compare to encryption and format preserving
encryption?
Are there performance issues regarding its use?
Is it standardized so one solution can exchange tokens with a different implementation?
Vic Wheatman talks to Voltage CTO Terrence Spies who urges enterprises to look at...
Mar 18, 2014
Security and the Internet of (Every)Thing.
How are data and communications going to be protected as CPUs and Near Field Communication chips become less expensive and are embedded in to the Internet of (Every)Thing?
What are some of the leading edge indicators and social trends that will drive the need?
securitycurrent's...
Mar 18, 2014
Security and the Internet of Things.
How are data and communictions going to be protected as CPUs and Near Field Communications chips become less expensive and are imbedded in to the Internet of (Every) Thing?
What are some of the leading edge indicators and social trends
that will drive the need?
securitycurrent's...