Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Scott Ferguson Editor, Enterprise Cloud, | 12/13/2017
Enterprises of all sizes are getting more comfortable moving company data into the cloud. However, moving data from on-premises to off-premises requires a delicate balancing act of shared security responsibilities between enterprise and the cloud service providers they employ.
Cover Image
Srivats Ramaswami CTO at 42Q, | 12/13/2017
Manufacturers deal with sensitive data each and every day. This includes test and quality data, warranty information, device history records, and especially the engineering specifications for a product that are highly confidential. Trusting that data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully ...
Cover Image
Simon Marshall Technology Journalist, | 12/12/2017
When looking back at the 2017 threat landscape, what event had the most impact? In a troublesome 12-month retrospective, Kaspersky Lab reckons WannaCry -- indirectly aided by the US National Security Agency -- was the baddest boy on the security block.
Cover Image
Paul Shomo Sr. Technical Manager, 3rd Party Technologies at OpenText, | 12/12/2017
Hackers and analysts do battle with tools and techniques that are constantly evolving. Cybersecurity is an arms race, but it's not a fair one: the bad guys get endless "do overs" during the attack, yet a single InfoSec mistake could invite a breach. This burden of consistency is probably why the good guys are losing. However, something new is coming over ...
Cover Image
Larry Loeb Author, | 12/11/2017
Security researchers from enSilo told attendees at the recent London Black Hat conference that they had some good news and some bad news for many of them.
Cover Image
Joe Stanganelli Principal, Beacon Hill Law, | 12/11/2017
At a recent conference in the Boston area for CFOs, speakers drove home for non-IT executives that cybersecurity is not a tech issue -- but, rather, a risk issue.
Cover Image
Bogdan Botezatu senior e-threat analyst, | 12/11/2017
In the past several years, ransomware has inflicted financial losses estimated at billions of dollars -- and that's only what victims have reported to law enforcement. Described by security researchers as one of the most prolific and financially stimulating malware categories, ransomware has successfully been ported to all operating systems (OS), ...
Cover Image
Simon Marshall Technology Journalist, | 12/8/2017
Is it next-generation threat detection? Is it counter-hacking? One thing we know is that it's designed to lure hackers to a replica enterprise environment so that threats can be eliminated. It's deception.
Cover Image
Nick Claxson Managing Director, Comtec Enterprises, | 12/8/2017
Hollywood scriptwriters must have been kicking themselves when cyber thieves came up with the idea of ransomware. It has well and truly captured the imagination, driving genuine fear into the hearts of many business leaders who had hitherto paid little attention to cyber threats in general.
discussion board
Chat
Flash Poll
upcoming Webinars
A Look Ahead to Security in 2018
Tuesday, December 19, 2017
12:00 p.m. New York / 5:00 p.m. London
here
Information Resources
Video
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with