Sign up for our weekly newsletter!
News Analysis
Latest Content
Insider Threats: Defense in All Directions
News Analysis  
9/11/2017   1 comment
In order to get ahead of insider threats you have to look in every direction.
Think You Know Hackers? Think Again
News Analysis  
9/8/2017   6 comments
Hackers are more than the stereotypes. This list gets you started on understanding those who understand your IT systems.
Women Will Solve the Cybersecurity Skills Shortage
News Analysis  
9/6/2017   Post a comment
If you need more cybersecurity professionals there's an untapped pool of candidates: women with great technical skills.
Big IoT Security Benefits From Service Providers Thinking Small
News Analysis  
8/31/2017   1 comment
It doesn't take many bad devices to wreck a network. Concentrating on a small number of miscreants can reap huge benefits for service providers.
VMware Offers App Security From the 'Goldilocks Zone'
News Analysis  
8/28/2017   7 comments
Making good on a theme pitched by Martin Casado and Tom Corn, VMware launches AppDefense to put the hypervisor at the heart of application security.
Closing Gaps in DNS
News Analysis  
8/25/2017   1 comment
Everyone uses DNS. How can you prevent hackers from using it to disrupt your business?
Unpacking Packed Malware
News Analysis  
8/24/2017   1 comment
Executable compression is a common technique for hiding malware. The question is, what can you do to unpack the threat?
'Good Enough' Probably Isn't
News Analysis  
8/21/2017   2 comments
Enterprise cyber defense needs to get better unless we want to see the executive revolving door spin even faster.
Digital Identity Will Drive Revenue & Reduce Risk
News Analysis  
8/17/2017   1 comment
Trusting the human behind the device can be as important as trusting the device in secure applications.
Magical Thinking Drives the Myth of AI Solving Security
News Analysis  
8/16/2017   13 comments
AI is being called the solution to future security problems, but we shouldn't rely on the technology for too much, too soon.
Lawyers Are Friends, Not Foes
News Analysis  
8/10/2017   Post a comment
When it comes to security allies, your corporate counsel should top the list.
Want to Be a Ransomware Victim? Pay Up
News Analysis  
8/3/2017   5 comments
Experience shows that the fastest way to become a repeat victim of ransomware is to pay ransom the first time.
How Secure Are Your IoT Devices?
News Analysis  
8/2/2017   6 comments
The IoT can be a huge attack surface: What are you doing to keep your smart devices free from stupid security faults?
Personal Security Begets Enterprise Security
News Analysis  
7/20/2017   2 comments
Employees' personal approach to information security is fundamentally crucial to their organizations' security posture. Accordingly, enterprises would do well to learn from recent hacks and rethink the way they train their employees in cybersecurity matters.
Small Businesses Need Secure ISPs
News Analysis  
7/7/2017   4 comments
Small businesses can't do it alone: They need secure services from ISPs and MSPs to survive today's hostile environment.
Are You Ready for GDPR?
News Analysis  
7/6/2017   1 comment
Multi-cloud and software-defined storage solutions may ease the way to GDPR compliance.
The Stress of Being CISO
News Analysis  
7/3/2017   3 comments
The title 'CISO' carries with it some serious stress. A new poll talks about that stress and what to do about it.
WannaCry Was Just the Beginning
News Analysis  
6/29/2017   18 comments
Petya proves that WannaCry is just the beginning of a new, far more serious type of cyberattack.
Five Questions for Healthcare Security
News Analysis  
6/26/2017   24 comments
Healthcare security regulations come with teeth. Five questions can help healthcare CISOs from being bitten.
Get Used to It: AI Will Extract Every Penny It Can
News Analysis  
6/23/2017   16 comments
It may not be fair, but it's the future.
False Positives Have Real Consequences
News Analysis  
6/22/2017   17 comments
False positives are more than just annoying – they can seriously disrupt your cybersecurity efforts.
Nothing's Certain, Except Death, Taxes... & Phishing
News Analysis  
6/21/2017   40 comments
Recent phishing attacks could mean that a tax bill is the least of your government revenue issues.
Deciphering the Threat Landscape
News Analysis  
6/19/2017   Post a comment
Why do we continue to see so many cyberbreaches? If we look at why many of the breaches in the past year have occurred, it comes down to three major factors.
Machine Learning Is the Next Great Security Weapon
News Analysis  
6/14/2017   5 comments
Enlisting machines will help level the playing field in the battle for enterprise cybersecurity.
Fixing the Tech Behind the Cyberwar
News Analysis  
6/13/2017   7 comments
As security, we have failed our very charges. We continue to allow them to be attacked and we fail at defense. What must we do to change this?
Autonomous Cars Must Be Secure to Be Safe
News Analysis  
6/13/2017   29 comments
All of the airbags and crumple zones in the world won't help if hackers can take control of self-driving cars. What can manufacturers do to keep these next-generation vehicles secure and safe?
From Enemies to Allies: Addressing Security Culture Clashes in Your Organization
News Analysis  
6/9/2017   Post a comment
Building secure organizations starts with people, not technology. Part 2 of a 2-part article.
Effective Leadership Means Effective Security
News Analysis  
6/7/2017   Post a comment
Raising security awareness across the enterprise requires diligence, leadership and contextual threat intelligence, and it starts in the C-suite.
The Security of SD-WAN
News Analysis  
6/5/2017   Post a comment
With Software-Defined WAN (SD-WAN), lower costs and increased efficiency are the big payoffs. Is there a price to be paid in security?
Your Security Problem Isn't Technical, It's Personal
News Analysis  
6/1/2017   1 comment
Finding a solution starts with admitting that there's a problem. In cybersecurity, the process should start with people, not technology.
Heavy Reading Launches a Security Market Tracker
News Analysis  
5/10/2017   Post a comment
As increasing numbers of telecom operators venture into the managed security space, Heavy Reading has launched a new research service that monitors and analyzes this emerging sector.
First AWS, Now Microsoft Cloud; Who's Next?
News Analysis  
5/4/2017   Post a comment
Outages are inevitable, but how can we deal with them better?
Security, Cloud & the SBC
News Analysis  
3/27/2017   Post a comment
Despite all the current hype surrounding 5G at the moment, it's cloud and security technologies that are fundamentally driving business growth opportunities for communications service providers.
CenturyLink: Changing the Security Mindset
News Analysis  
3/10/2017   Post a comment
Businesses need to think of cyber security as more than an occasional investment.
Pay-TV Security Gets 50 Shades Darker
News Analysis  
3/2/2017   Post a comment
Pay-TV providers are seeing new security threats and vulnerabilities every day, and are facing numerous challenges trying to tighten the security that protects organizations, as well as their customers.
Machine Learning at Heart of Security M&A Splurge
News Analysis  
2/8/2017   Post a comment
Four acquisitions in a week all point to the growing importance of machine learning for major security system vendors.
Nokia's Efforts to Lead in Security
News Analysis  
2/2/2017   Post a comment
Nokia is maintaining its strategic emphasis on network security and may have some plausible claims to be ahead of its major vendor rivals – but it still has a lot of questions to answer.

Latest Articles
The infrared capabilities of security cameras provide a new way for attackers to reach systems that have no connection to the Internet.
A new report by F5 and Ponemon looks at the state of the CISO in modern enterprises.
Companies are worried about security in the public cloud, but a new survey shows they don't understand the basics.
A growing number of security and networking vendors are talking about intent-based security as a next-gen solution.
The hack that put malware on an update of a popular security program was not the work of a first-time malware author.
Flash Poll
Information Resources
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with