Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Ameya Talwalkar Co-Founder and Chief Product Officer, Cequence Security, | 6/26/2019
Looking back on all the application security discussions we have had with security practitioners in the past 12 months or so, there are five key trends that impact how enterprise firms seem to be addressing application security -- and increasingly they are looking to vendors for guidance here.
Cover Image
Larry Loeb Author, | 6/26/2019
Researchers keep coming up with memory side-channel vulnerabilities in modern processors and DRAMs, like Rowhammer, RAMBleed, Spectre and Meltdown. All of these attacks bypass architectural safeguards that are supposed to keep data behind an unscalable wall. The attacks act to infer memory-resident data that is being stored in plaintext for operational ...
Cover Image
Larry Loeb Author, | 6/24/2019
SafeBreach Labs has found a problem with the disk trouble-shooting software that comes preinstalled on Dell Computers. It fails at DLLs. The software comes preinstalled on Dells that run Windows, which means that 100 million installs are at risk.
Cover Image
Larry Loeb Author, | 6/21/2019
Quantum computing (QC) has long held the promise of exceeding what is possible in conventional computing. Physicists have held that a 50 qubit QC arrangement could outperform any of today's supercomputers, according to an MIT Technology Review article.
Cover Image
Larry Loeb Author, | 6/20/2019
Certificate Authorities (CAs) are continually getting requests from threat actors who want certificates that they aren't entitled to so that their criminal schemes may be furthered.
Cover Image
Larry Loeb Author, | 6/19/2019
Anomali Labs has found a new kind of malware (they call it IPStorm) that is controlled by peer-to-peer (p2p) communications rather than by a client-server model. The p2p network is established over the open-source InterPlanetary File System's (IPFS) p2p network. This is the first malware found in the wild that is using IPFS's p2p network for its command ...
Cover Image
Larry Loeb Author, | 6/17/2019
Dragos has been watching the XENOTIME threat actor since it first came on the scene in 2014. It wrote a new advisory that says this threat actor is showing new signs of expansion into new verticals.
Cover Image
Larry Loeb Author, | 6/14/2019
OneLogin, a password management tool vendor, did some research using Arlington Research into -- what else? -- password management. They surveyed 600 IT professionals in the US and the UK in order to gauge how companies are protecting passwords by means of tools, guidelines and practices in their report, Password Practices 2019.
Cover Image
Larry Loeb Author, | 6/13/2019
Security firm Preempt issued an advisory that showed how to conceptually bypass the Enhanced Protection for Authentication (EPA) that prevents attackers from performing a relay of NT Lan Manager (NTLM) messages to top-level security (TLS) sessions. Attackers could use NTLM to enable their own fake sessions. Since a relay attack is the most common one ...
discussion board
Chat
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with