Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Joe Stanganelli Principal, Beacon Hill Law, | 11/21/2017
"Davide" (a real person, but not his real name), a mid-level executive at a major international bank, would not be overly difficult to hack.
Cover Image
Curtis Franklin Security Editor, | 11/20/2017
The notion that every organization has a perimeter that has been breached isn't new. And much of modern security is how to deal with that. But take it a step further: What do you do when every employee, customer and partner has personal info that has been hacked?
Cover Image
Larry Loeb Author, | 11/20/2017
It's the time of year when Apple pops out a new iPhone to extract any money that may be lying around a consumer's wallet. The newest one (do we call it iPhone "Ecks" or "ten" or what?) has some interesting technology in it called FaceID.
Cover Image
Curtis Franklin Security Editor, | 11/17/2017
Protecting DNS is critical. When DNS protects you and your business, it's (potentially) amazing. That's what a new service called Quad9 is about.
Cover Image
Curtis Franklin Security Editor, | 11/17/2017
In the spirit of our parent publication Light Reading, a Friday Security Haiku.
Cover Image
Curtis Franklin Security Editor, | 11/17/2017
Barracuda, a company that made its name providing firewall appliances for the traditional data center, has introduced a new set of next-generation firewalls with what it is calling "Cloud-Generation firewall capabilties."
Cover Image
Teri Radichel Director of Security Strategy & Research, WatchGuard Technologies, | 11/16/2017
The number of recent data breaches and the amount of stolen data is staggering. At times, finding ways to stop the latest cyber attacks may seem overwhelming. Even though the malware that infiltrates an organization can be very complicated and stealthy, many breaches share common characteristics that appear in traffic logs of carefully designed networks. ...
Cover Image
Simon Marshall Technology Journalist, | 11/16/2017
In 2018, you have a choice: stride boldly into a new year and defend against a bunch of increased or new security threats, or hide under your desk with your PC turned off.
Cover Image
Curtis Franklin Security Editor, | 11/15/2017
Multi-factor authentication is becoming a "must" for many applications but questions remain about which factors are secure. A recent report from researchers in Vietnam has cast doubts on one promising new factor now available to millions.
discussion board
DougJackson
DougJackson, 11/21/2017 12:10:43 PM
A New Fence: The Software-Defined Perimeter
Re: Re: Re : The future of networks..
Great point @Joe Stanganelli. Very true. Interested to see how things change over the next 10-15 years.

Post Your Reply
Chat
Flash Poll
upcoming Webinars
Microsegmentation: A Better Way to Protect Application Workloads & Secure Data
Thursday, November 30, 2017
1:00 p.m. EST / 10:00 a.m. PST
A Look Ahead to Security 2018
Tuesday, December 19, 2017
12:00 p.m. New York / 5:00 p.m. London
Information Resources
Video
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with