Sign up for our weekly newsletter!
News & Views
Cover Image
Simon Marshall Technology Journalist, | 4/24/2018
Consumers all over the world continue to click and tap on bogus links on websites and mobile apps, losing personal information and money to conman phishing attacks.
Cover Image
Scott Ferguson Editor, Enterprise Cloud, | 4/24/2018
Atlanta may not have shelled out the $51,000 in Bitcoin that the group behind a recent ransomware attack demanded, but the city ended up paying dearly.
Cover Image
Scott Ferguson Editor, Enterprise Cloud, | 4/24/2018
A recent security incident at SunTrust Banks shows how dangerous an insider threat is to any enterprise.
Cover Image
Larry Loeb Author, | 4/23/2018
Cybercrime discussions have historically focused on how it happens. Specifically, what the technical parts of it are composed of and how does it work. Malware types, security holes and the prevention of attacks are concrete and can be described and understood.
Cover Image
Alan Zeichick Principal Analyst, Camden Associates, | 4/23/2018
SAN FRANCISCO -- Blame people for the SOC scalability challenge. On the other hand, don't blame your people. It's not their fault.
Cover Image
Scott Ferguson Editor, Enterprise Cloud, | 4/23/2018
If you haven't been thinking about the security of your unpatched or misconfigured routers, now's a good a time to start.
Cover Image
Larry Loeb Author, | 4/20/2018
It's now common for websites to use a "Login with Facebook" button on their sites as a convenience for users. However, security researchers from Princeton University have discovered that some advertising and analytics services are siphoning user data from these pages when such a button is present.
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 4/20/2018
Cybersecurity so far this year is offering a mix of good news, bad news and warnings, according to a report released this week by professional services company Accenture.
Cover Image
Scott Ferguson Editor, Enterprise Cloud, | 4/19/2018
SAN FRANCISCO -- There's a dirty secret lying right behind the corporate firewall: The IT department can't identify the traffic coming into the enterprise network.
discussion board
Ariella, 4/23/2018 4:12:48 PM
It's the People: 5 Reasons Why SOC Can't Scale
Re: so?
So are we doomed? Or is there some way out of the mess that you see happening?

Post Your Reply
Information Resources
upcoming Webinars
Making the Case for a DevSecOps Transformation
Thursday, April 26, 2018
12 p.m. New York / 5 p.m. London
Cloud Access Security Brokers in the Wild
Wednesday, May 30, 2018
1:00 p.m. EST / 10:00 a.m. PST
Flash Poll
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with