Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Curtis Franklin Security Editor, | 8/23/2017
When most IT managers think about cybersecurity, they're thinking about keeping their company's data safe from criminals and cyber-warfare opponents. Some service providers, most recently DreamHost, have expanded that list of adversaries to include the US Department of Justice. And on August 22, DreamHost scored a small victory in their most recent battle.
Cover Image
Curtis Franklin Security Editor, | 8/23/2017
Delaware has become the latest state to enact legislation on computer security, joining at least 13 other states in setting specific requirements for companies doing business within their borders. Delaware's law is notable in two regards, the first involving the nature of Delaware and the second a critical provision within the law itself.
Cover Image
Curtis Franklin Security Editor, | 8/22/2017
When it comes to authorized access, you need to know the system that's trying to connect and you need to know and trust the human behind the system. Knowing the human is the first part of what Starling Identity Analytics & Risk Intelligence (IARI), a new SaaS-based service from One Identity, does for the enterprise.
Cover Image
Curtis Franklin Security Editor, | 8/22/2017
We move data around systems and networks, but in the final analysis everything comes down to the applications. And in 2017 the news is still filled with stories of companies that left a door open to their data and systems -- an accidental door right in the middle of their enterprise applications. That's why this week's episode of Voice of Security is all ...
Cover Image
Curtis Franklin Security Editor, | 8/21/2017
What is it about Amazon S3? While thousands of customers are able to securely keep data on the large storage cloud, a disconcerting number of companies seem to lose the ability to correctly configure storage when faced with the Amazon Web Services buckets. The latest misconfiguration victim? Groupize, a meeting management and hotel-booking company based ...
Cover Image
Philip Lieberman President and CEO, Lieberman Software Corp., | 8/21/2017
For several years now, I have advocated that CEOs must begin acting as the Commander-in-Chief of cyber warfare for their companies. This role would involve the chief executive building resiliency into not only the business itself but also into IT, which is now key to the survival of the business.
Cover Image
Larry Loeb Author, | 8/21/2017
Apple gets peeled Someone named xerub is causing some sleepless nights in Cupertino. What s/he has done is publish the key used for the iPhone's Secure Enclave Processor's (SEP) firmware.
Cover Image
Curtis Franklin Security Editor, | 8/18/2017
When DevSecOps are defined it can begin a process. But ultimately process requires tools to become practice. Where do you go to find tools to use when an organization wants to move beyond theory adding security to DevOps?
Cover Image
Curtis Franklin Security Editor, | 8/18/2017
In the spirit of our parent publication Light Reading, a Friday Security Haiku.
discussion board
Chat
Flash Poll
Radio Shows
Information Resources
Video
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with