Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Curtis Franklin Security Editor, | 10/19/2017
Encryption can save an enterpise and its data. Right now, though, the question is who's going to save encryption.
Cover Image
Michal Salát Threat Intelligence Director, Avast, | 10/19/2017
In today's digital world, we are literally surrounded by "smart" devices, or Internet of Things (IoT) devices. Making devices smart is a trend to be applauded, but there is one very important thing that is frequently an afterthought: security.
Cover Image
Curtis Franklin Security Editor, | 10/18/2017
It's time to check your spam-blockers again because Necurs is back in town. This time it's bringing a new ransomware payload and a way to check on your defenses.
Cover Image
Curtis Franklin Security Editor, | 10/18/2017
McAfee, at its first MPOWER event since leaving the Intel corporate fold, has made a series of product announcements focused on analytics and security. The new Investigator product takes the lead, with additional products announced for SOCs, endpoints and cloud platforms.
Cover Image
Curtis Franklin Security Editor, | 10/17/2017
By this time you've probably heard about the KRACK attack, and what you've heard is right. This one is bad, and it's everywhere.
Cover Image
Simon Marshall Technology Journalist, | 10/17/2017
Hackers heading into an enterprise have another reason to be cautious: they could become the hunted, not the hunter. In a kind of cyber bait-and-switch, valuable data turns out to fake, and the trap is sprung. More and more enterprises are becoming interested in so-called deception technology, designed to turn the tables on attackers.
Cover Image
Larry Loeb Author, | 10/16/2017
How a website can make money for someone has been a concern since the web began. The first answer that emerged was a port of the kind of advertisement that might be seen in a newspaper, but on a web page. Just charging someone for displaying it didn't work out so well, so tying that ad to traffic generated for the advertiser -- the click-through -- was ...
Cover Image
Simon Marshall Technology Journalist, | 10/13/2017
Archetypically, hackers are unseen cloaked mysteries that run free in the night and pillage with impunity. It's not until daybreak that the damage is reckoned. Hackers hunt and exploit the vulnerable. But they themselves are also the hunted.
Cover Image
Curtis Franklin Security Editor, | 10/13/2017
When you study human communications, things can get complicated. Many theories can explain what we think about what we hear and see. But here's something that's not complicated: When we read stories about crime, we tend to think that the world is a more dangerous place.
discussion board
Chat
Information Resources
Flash Poll
upcoming Webinars
ARCHIVED
Agility, Scalability & Automation – Enabling Digital Transformation Through the ADC
Thursday, October 12, 2017
11:00 a.m New York/ 4:00 p.m. London
Video
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with