Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Latest Content
Page 1 / 2   >   >>
How Can You Beat the Widespread ROCA?
Curt Franklin  
10/19/2017   Post a comment
ROCA is a vulnerability hitting millions of devices. How can you tell if yours are affected and what can you do if they are?
GDPR Pressure Begins on US Multinationals
Simon Marshall  
10/19/2017   Post a comment
GDPR may be an EU regulation but it will have a significant impact on US companies doing business with any European customer, and the impact will start soon.
Can the IoT Be More Secure?
News Analysis  
10/19/2017   Post a comment
The IoT has lots of insecurity built in – but here are some ways to make it more secure.
Necurs Malware Wants a Selfie With Your Desktop
Curt Franklin  
10/18/2017   1 comment
Necurs has returned and this time it's carrying a payload that takes a picture of your desktop.
McAfee Brings AI to Security With New Products
Curt Franklin  
10/18/2017   Post a comment
McAfee has announced new products at MPOWER products that bring AI and machine learning to security analytics.
KRACK Attack: How Enterprises Can Protect Their WiFi
Curt Franklin  
10/17/2017   1 comment
A flaw in the WPA2 protocol means that most WiFi networks worldwide are open to successful attack.
Attivo Goes On the Attack Against Hackers
Simon Marshall  
10/17/2017   1 comment
Attivo gets $21 million in new funding to take the fight to hackers through advanced deception.
HONEST Poll Results: How Much Should You Encrypt?
Curt Franklin  
10/16/2017   4 comments
What is the 'Goldilocks Zone' when it comes to encryption? Security Now community members speak out in our latest poll.
CoinHive Mines New Malware Potential
Larry Loeb  
10/16/2017   3 comments
Some websites have developed a new revenue stream. Unfortunately, it involves placing malware on visitors' computers.
Cisco Talos Team Tackles Top-Tier TXT Threat
Simon Marshall  
10/13/2017   1 comment
Talos researchers have taken down an attack aimed at the Securities and Exchange Commission.
Risk & Reality Take Different Paths in Cybersecurity
Curt Franklin  
10/13/2017   1 comment
A new study by Barracuda shows once again that the reality and perception of cyberrisks are two very different things.
Security by Discomfort
News Analysis  
10/12/2017   3 comments
If you want to bridge the talent gap, look beyond the usual pool of corporate candidates to fill infosec positions.
ShiftLeft Secures Code Pre-Threat
Simon Marshall  
10/12/2017   4 comments
Startup ShiftLeft is moving security forward in the software development lifecycle.
Final Decision in Dreamhost Battle With DOJ
Curt Franklin  
10/11/2017   Post a comment
In the legal battle between the Department of Justice and Dreamhost, a resolution and a victory.
Rowhammer Attack Pounds With Precision
Larry Loeb  
10/11/2017   1 comment
A new variant of the Rowhammer attack can work around every known defense.
How Companies Avoid Doing Business With Sanctioned Entities
Security TV  
10/10/2017   1 comment
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., Russia and Iran) or individuals (e.g., drug dealers or terrorists) sanctioned by the US government. In this video, Bureau van Dijk's Anders Rodenberg explains the Office of Foreign Assets Control (OFAC) '50% rule' and how companies can ensure they're in compliance with it.
PoohMilk Is Advanced Spear-Phishing
Simon Marshall  
10/10/2017   3 comments
A new vulnerability in Microsoft Office means a new opportunity for phishing – and PoohMilk answers the call.
Where Should Security Live?
News Analysis  
10/6/2017   3 comments
Security can sit in many locations. Where is the best spot for your organization's security center?
Friday Haiku: Waves in the Harbor
Curt Franklin  
10/6/2017   5 comments
Do calm winds aloft mean peaceful waves at anchor?
SONIC Quiet on Data Breach Details
Simon Marshall  
10/6/2017   10 comments
Drive-in restaurant chain SONIC has suffered a breach but customers and the public are still looking for critical details.
Gartner Says Real Security Starts With a Mission
Curt Franklin  
10/6/2017   Post a comment
Security for the digital organization starts with a mission that has executive support; the process from mission to execution is step-by-step.
CLKSCREW Hack Breaks Hardware With Software
Larry Loeb  
10/5/2017   4 comments
A new technique can hack into even secure systems by overwhelming with simple commands.
Finding the AI ROI
Simon Marshall  
10/5/2017   Post a comment
Is AI a good security investment? Many say yes, but it depends on how you deploy your artificial intelligence.
Yahoo Breach News Just Gets Worse
Curt Franklin  
10/4/2017   29 comments
It turns out that more than 3 billion accounts were compromised in the Yahoo breach originally disclosed last year.
Simple Steps to Online Safety for Cybersecurity Awareness Month
News Analysis  
10/4/2017   8 comments
National Cybersecurity Awareness Month is a great time to give your users a new list of security tips.
Gartner Lists Security Trends for 2018
Curt Franklin  
10/3/2017   1 comment
A session at Gartner Symposium/ITxpo laid out security trends for the coming year.
A Month for Cybersecurity
Simon Marshall  
10/3/2017   2 comments
It's National Cybersecurity Awareness Month, a time to think about, plan and deploy better cybersecurity for your organization.
Gartner Analysts See AI Augmenting Security
Curt Franklin  
10/2/2017   Post a comment
Gartner analysts don't think AI will replace humans in security; instead it will be a critical piece of a better security infrastructure.
Gartner Symposium Opens in Orlando
Curt Franklin  
10/2/2017   1 comment
Gartner Symposium ITXpo is opening today in Orlando. Security Now is there to bring you the latest from the analysts and consultants at one of the most influential firms in the IT industry.
Sunflower Security Mixes Lights, Drones for Safer Buildings
Simon Marshall  
10/2/2017   Post a comment
A new security company may change the way we think about residential security.
Security Fails in Third-Party Hands
Larry Loeb  
10/2/2017   2 comments
Your security may rest in the hands of a third party – and those hands will probably let you down.
Friday Haiku: The Quantum Future
Curt Franklin  
9/29/2017   3 comments
The Friday Haiku reflects on a week in Orlando's heat.
Consumers Think Security When Choosing Brands
Simon Marshall  
9/29/2017   4 comments
Consumers are beginning to pay attention to security reputation when choosing which brands to support.
Authentication Tackles Forests at Microsoft Ignite
Curt Franklin  
9/29/2017   2 comments
Authentication is an issue on a personal computer. It's a complex problem in AD forest management.
Security Takes On Malicious DNA (Files)
News Analysis  
9/28/2017   3 comments
Securing biomedical research can mean protecting systems from malicious code in the samples under investigation.
Fortanix Has Series A Funding for Run-Time Encryption
Simon Marshall  
9/28/2017   Post a comment
Fortanix has introduced new technology for run-time encryption to protect sensitive data.
Three Reasons Facial Recognition Will Win
Curt Franklin  
9/27/2017   12 comments
Facial recognition technology is coming to a device near you. Here are three reasons it's inevitable.
Deloitte Hack Still Has More Questions Than Answers
Simon Marshall  
9/27/2017   4 comments
The huge hack of global accounting firm Deloitte is still presenting more questions than answers for security professionals.
Microsoft Ignite: 9 Things to Know
Curt Franklin  
9/26/2017   1 comment
Microsoft's largest annual conference, Ignite, is underway in Orlando, Fla. Security Now is there and here's what we're seeing.
Safety Starts With Data: An Interview With GM's Head of Product Cybersecurity
Simon Marshall  
9/26/2017   Post a comment
An insightful Security Now interview with Jeff Massimilla, vice president global vehicle safety and product cybersecurity at General Motors.
Splunk Ups Machine IQ in Software Updates
Curt Franklin  
9/26/2017   Post a comment
Splunk has increased machine intelligence and analytics capabilities in a series of software updates.
Microsoft's Nadella Shares the Future at Ignite
Curt Franklin  
9/25/2017   3 comments
Satya Nadella's keynote address can be boiled down to four phrases or words. Here's what you need to know to get ready for the Microsoft future.
Encryption: 6 Ways to Make It Matter
Curt Franklin  
9/25/2017   6 comments
A Security Now special report provides best practice notes for encryption in the enterprise.
Law Comes to the Self-Driving Wild West, Part 2
Simon Marshall  
9/25/2017   2 comments
Legislators and regulators are scrambling to build a legal framework to support intelligent, connected and self-driving cars.
Right & Wrong Lessons From the Equifax Breach
Curt Franklin  
9/22/2017   12 comments
There are lots of lessons to learn from the Equifax breach. Just make sure you're learning the right ones.
Friday Haiku: Gem or Not?
Curt Franklin  
9/22/2017   4 comments
How will CISOs respond to the pressure of recent breaches? The Friday haiku asks the question.
NIST Redefines the Good Password
News Analysis  
9/22/2017   6 comments
NIST has offered new guidelines for best practices in passwords.
Law Comes to Self-Driving Wild West
Simon Marshall  
9/22/2017   2 comments
Legislation has begun focusing on the security needs of self-driving cars. Part one of a two-part article.
A New, Invisible Threat Jumps the Air Gap
Curt Franklin  
9/21/2017   4 comments
The infrared capabilities of security cameras provide a new way for attackers to reach systems that have no connection to the Internet.
CISOs Under Fire: New Poll Shows Progress & Peril
Curt Franklin  
9/20/2017   2 comments
A new report by F5 and Ponemon looks at the state of the CISO in modern enterprises.
Page 1 / 2   >   >>




Latest Articles
ROCA is a vulnerability hitting millions of devices. How can you tell if yours are affected and what can you do if they are?
GDPR may be an EU regulation but it will have a significant impact on US companies doing business with any European customer, and the impact will start soon.
Necurs has returned and this time it's carrying a payload that takes a picture of your desktop.
McAfee has announced new products at MPOWER products that bring AI and machine learning to security analytics.
A flaw in the WPA2 protocol means that most WiFi networks worldwide are open to successful attack.
Flash Poll
upcoming Webinars
ARCHIVED
Agility, Scalability & Automation Enabling Digital Transformation Through the ADC
Thursday, October 12, 2017
11:00 a.m New York/ 4:00 p.m. London
Information Resources
Video
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with