Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 6/22/2018
These are trying times for Tesla.
Cover Image
Larry Loeb Author, | 6/22/2018
Local networks are familiar and fuzzy to users, and because of that familiarity, most assume that they are secure. But, that might not be true.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 6/21/2018
Satori, the widespread botnet that has been linked to distributed denial of service (DDoS) attacks as well as cryptomining schemes, has resurfaced and is currently targeting certain D-Link routers in an effort to expand its network, according to a new analysis.
Cover Image
Alan Zeichick Principal Analyst, Camden Associates, | 6/21/2018
Ever since they burst onto the scene, containers have been legitimately hailed as a very efficient means to deploy applications onto servers. Containers, such as those based on the Docker open-source standards, consume fewer resources than virtual machines, and containers are easier to design and faster to instantiate and provision.
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 6/20/2018
The hacking group behind the Olympic Destroyer malware that hit the opening of the Winter Olympics in South Korea earlier this year has resurfaced in a campaign that is targeting organizations in Europe connected to efforts to protect against chemical and biological threats.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 6/20/2018
Cyber criminals are increasingly building a network of hidden tunnels to carry out sophisticated command and control (C&C) attacks against banks and other financial institutions in order to steal a wealth of personal data, according to a new industry study.
Cover Image
Larry Loeb Author, | 6/20/2018
In malware, everything old becomes new again. An exploit may work for a time and then be mitigated, but that doesn't stop threat actors from later trying it again in a different form.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 6/19/2018
Over the first six months of this year, cybercrimes involving cryptocurrency have overtaken ransomware as the biggest current threat facing enterprise security professionals, whether it's attackers planting malware on devices to mine the virtual currency or any number of cryptojacking schemes.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 6/19/2018
Check Point is giving a red card to cybercriminals conducting a phishing campaign against World Cup soccer fans.
discussion board
Susan Fourtané
Susan Fourtané , 6/22/2018 4:35:13 PM
Tesla Lawsuit Claims Insider Breached Company Security
Re: Trust
Is any other company ever going to trust Martin Tripp?

Post Your Reply
mhhfive
mhhfive, 6/21/2018 7:59:14 PM
Containers in the Cloud Are Great, but Are They Secure?
If the CIA trusts Amazon... what could go wrong? 

Post Your Reply
Chat
Flash Poll
Video
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with