Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Curtis Franklin Security Editor, | 10/17/2017
By this time you've probably heard about the KRACK attack, and what you've heard is right. This one is bad, and it's everywhere.
Cover Image
Simon Marshall Technology Journalist, | 10/17/2017
Hackers heading into an enterprise have another reason to be cautious: they could become the hunted, not the hunter. In a kind of cyber bait-and-switch, valuable data turns out to fake, and the trap is sprung. More and more enterprises are becoming interested in so-called deception technology, designed to turn the tables on attackers.
Cover Image
Curtis Franklin Security Editor, | 10/16/2017
If the goal is to keep data out of unauthorized hands, should organizations simply encrypt every bit they possess?
Cover Image
Larry Loeb Author, | 10/16/2017
How a website can make money for someone has been a concern since the web began. The first answer that emerged was a port of the kind of advertisement that might be seen in a newspaper, but on a web page. Just charging someone for displaying it didn't work out so well, so tying that ad to traffic generated for the advertiser -- the click-through -- was ...
Cover Image
Simon Marshall Technology Journalist, | 10/13/2017
Archetypically, hackers are unseen cloaked mysteries that run free in the night and pillage with impunity. It's not until daybreak that the damage is reckoned. Hackers hunt and exploit the vulnerable. But they themselves are also the hunted.
Cover Image
Curtis Franklin Security Editor, | 10/13/2017
When you study human communications, things can get complicated. Many theories can explain what we think about what we hear and see. But here's something that's not complicated: When we read stories about crime, we tend to think that the world is a more dangerous place.
Cover Image
Joe Stanganelli Principal, Beacon Hill Law, | 10/12/2017
In the world of cybersecurity, executive leaders and HR workers alike constantly complain of talent shortages. One of the primary takeaways at a recent InfoSec event targeted to upper-level cybersecurity workers, however, was the notion of starting to see and think about things in different ways -- talent being no exception.
Cover Image
Simon Marshall Technology Journalist, | 10/12/2017
It's quite a talent to be able to see into the future. Someone might be willing to pay for it. No, this is not the next Marvel movie script, and this is not Destiny. But it's definitely where a company that just launched sees software security evolving to next.
Cover Image
Curtis Franklin Security Editor, | 10/11/2017
In August, Security Now reported on the legal battle between hosting provider Dreamhost and the US Department of Justice. On October 10, the judge in the case made a final ruling -- and it looks as though Dreamhost got most of what it was fighting for.
discussion board
mhhfive
mhhfive, 10/17/2017 7:10:34 PM
KRACK Attack: How Enterprises Can Protect Their WiFi
Encrypt everything! The HONEST poll results were right... 

Post Your Reply
Chat
Flash Poll
upcoming Webinars
ARCHIVED
Agility, Scalability & Automation – Enabling Digital Transformation Through the ADC
Thursday, October 12, 2017
11:00 a.m New York/ 4:00 p.m. London
Information Resources
Video
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with