Sign up for our weekly newsletter!
News & Views
Cover Image
Curtis Franklin Security Editor, | 9/26/2017
Splunk has announced major updates to its product portfolio with the release of Splunk Enterprise 7.0, Splunk IT Service Intelligence (ITSI) 3.0, Splunk User Behavior Analytics (UBA) 4.0 and updates to Splunk Cloud. The releases were announced at Splunk's annual user conference, .conf2017, in Washington, DC.
Cover Image
Curtis Franklin Security Editor, | 9/25/2017
At Microsoft's Ignite conference, which brings developers, partners and customers together for a week of education and enthusiasm, CEO Satya Nadella took the opening-morning keynote stage to deliver an address that was short on details about new products but long on vision. The details on display boiled down to four carefully curated words or phrases: ...
Cover Image
Curtis Franklin Security Editor, | 9/25/2017
One of the truths exposed by recent events is that data is vulnerable. IT security workers have two tasks to address the situation: Make all data less vulnerable, and make vulnerable data less useful to unauthorized eyes. The road to success at the latter lies along an encrypted path.
Cover Image
Simon Marshall Technology Journalist, | 9/25/2017
This is the second part of an article on efforts to develop a legal framework for intelligent cars. If you haven't already read part one, it's a good place to start.
Cover Image
Curtis Franklin Security Editor, | 9/22/2017
Equifax, the gift that keeps on giving to hackers and journalists alike, continues to rain fallout over the security landscape. At the end of last week the fallout was the "retirement" of the CISO and CIO, and the subsequent learning of a great many lessons, most of them wrong.
Cover Image
Curtis Franklin Security Editor, | 9/22/2017
In the spirit of our parent publication Light Reading, a Friday Security Haiku.
Cover Image
Yaron Zinar Senior security researcher, Preempt, | 9/22/2017
What makes a secure password? The National Institute for Science and Technology (NIST) has released a new set of guidelines that will be required reading for those in government IT -- and highly recommended for everyone else. In general, the new guidelines push for longer passwords (eight characters minimum and support for up to 64 characters), while ...
Cover Image
Simon Marshall Technology Journalist, | 9/22/2017
Earlier this month, bill number H.R.3388 passed the House, and now awaits comment from the Senate Committee on Commerce, Science, and Transportation, having already been read twice. Better known as the Self Drive Act, it seeks to define of a set of safety standards for autonomous vehicles (AVs) that can be administered by the Department of Transportation ...
Cover Image
Curtis Franklin Security Editor, | 9/21/2017
In the world of security, the ultimate defense is the air gap -- a total physical separation of the network or device from the rest of the world. But air gaps have been shown to be vulnerable in the past, and researchers in Israel have now demonstrated a new way to cross the gap and reach systems previously thought to be safe.
discussion board
Flash Poll
upcoming Webinars
Information Resources
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with