Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 8/17/2018
The security of the US election system and of candidates' campaigns has been front and center in a national discussion that began with the Russian interference in the 2016 presidential campaign, and continues as the country gets closer to fast-approaching 2018 midterms in November. Such security was a focus in the recent Black Hat and DEF CON events in ...
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 8/17/2018
The fax machine might seem like a relic of the past in this age of instant communication, but fax systems are still in millions of offices as part of connected all-in-one printers, and that connectivity makes these systems another pathway for hackers to get into corporate and consumer networks. Researchers at Check Point put that threat into focus when ...
Cover Image
Joe Stanganelli Principal, Beacon Hill Law, | 8/16/2018
Johan Lidros, the president of the Eminere Group, gave a recent presentation concerning how inappropriate access and shared accounts top the very long list of common findings of identity and access management (IAM) audits.
Cover Image
Larry Loeb Author, | 8/15/2018
The Internet Engineering Task Force (IETF) made version 1.3 of Transport Layer Security official on August 10. This is now the industry standard for secure Internet connections via HTTPS. After heated discussions for the last two years, TLS 1.3 is now finally supported in both the Chrome and Firefox browsers, and in Facebook.
Cover Image
Paul Martini CEO & co-founder of iboss, | 8/15/2018
Most modern organizations take advantage of a decentralized workforce, and for good reason: When employees have the flexibility to work outside of the main office, they're more readily available to address issues in real time, making them "always on" without feelings of unnecessary strain.
Cover Image
Joe Stanganelli Principal, Beacon Hill Law, | 8/14/2018
Is it possible for a remote actor on the other side of the world to completely take over your smartphone and everything on it? If this month's announcements in US government-backed research on mobile-device security are any fair indication, the answer could well be yes.
Cover Image
Larry Loeb Author, | 8/13/2018
During last week's Black Hat conference in Las Vegas, researchers showed how Microsoft's Cortana virtual assistant could be used to bypass the Windows lock screen. The vulnerability affects Windows 10 machines and Windows 10 Servers.
Cover Image
Alan Zeichick Principal Analyst, Camden Associates, | 8/13/2018
LAS VEGAS -- The cybersecurity industry has embraced artificial intelligence and machine learning. Seemingly every exhibitor at this year's Black Hat conference is touting AI, whether it's for scanning email attachments for malware, detecting patterns in network access patterns, filtering alerts for rapid incident triage or finding anomalies in user ...
Cover Image
Larry Loeb Author, | 8/10/2018
As the widespread networking of computers in the last few decades gave rise to new kinds of security problems, the trend to make cities networked is starting to show how attackers may be able to cause disruption in them.
discussion board
Susan Fourtané
Susan Fourtané , 8/16/2018 5:53:54 AM
Spam at 40: Still a Robust Security Threat in Middle Age
Do you agree with Monahan?

Post Your Reply
Chat
Flash Poll
Video
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with