Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Curtis Franklin Security Editor, | 10/19/2017
Encryption can save an enterpise and its data. Right now, though, the question is who's going to save encryption.
Cover Image
Simon Marshall Technology Journalist, | 10/19/2017
Europe's influence in US data protection law will soon prove whether businesses that hold personally identifiable information (PII) can meet the new General Data Protection Regulations (GDPR), currently awaiting launch in the US after the EU-US Privacy Shield act was ratified Wednesday by the EU.
Cover Image
Curtis Franklin Security Editor, | 10/18/2017
It's time to check your spam-blockers again because Necurs is back in town. This time it's bringing a new ransomware payload and a way to check on your defenses.
Cover Image
Curtis Franklin Security Editor, | 10/18/2017
McAfee, at its first MPOWER event since leaving the Intel corporate fold, has made a series of product announcements focused on analytics and security. The new Investigator product takes the lead, with additional products announced for SOCs, endpoints and cloud platforms.
Cover Image
Simon Marshall Technology Journalist, | 10/17/2017
Hackers heading into an enterprise have another reason to be cautious: they could become the hunted, not the hunter. In a kind of cyber bait-and-switch, valuable data turns out to fake, and the trap is sprung. More and more enterprises are becoming interested in so-called deception technology, designed to turn the tables on attackers.
Cover Image
Curtis Franklin Security Editor, | 10/16/2017
If the goal is to keep data out of unauthorized hands, should organizations simply encrypt every bit they possess?
Cover Image
Larry Loeb Author, | 10/16/2017
How a website can make money for someone has been a concern since the web began. The first answer that emerged was a port of the kind of advertisement that might be seen in a newspaper, but on a web page. Just charging someone for displaying it didn't work out so well, so tying that ad to traffic generated for the advertiser -- the click-through -- was ...
Cover Image
Simon Marshall Technology Journalist, | 10/13/2017
Archetypically, hackers are unseen cloaked mysteries that run free in the night and pillage with impunity. It's not until daybreak that the damage is reckoned. Hackers hunt and exploit the vulnerable. But they themselves are also the hunted.
Cover Image
Curtis Franklin Security Editor, | 10/13/2017
When you study human communications, things can get complicated. Many theories can explain what we think about what we hear and see. But here's something that's not complicated: When we read stories about crime, we tend to think that the world is a more dangerous place.
discussion board
Chat
Flash Poll
upcoming Webinars
ARCHIVED
Agility, Scalability & Automation – Enabling Digital Transformation Through the ADC
Thursday, October 12, 2017
11:00 a.m New York/ 4:00 p.m. London
Information Resources
Video
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
Join editor Curt Franklin and guest Rebekah Brown, threat intelligence lead at Rpaid7, as they discuss the the most important news at one of the largest security conferences of 2017.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with