Sign up for our weekly newsletter!
News Analysis
Latest Content
Uber Loses Customer Data: Customers Yawn & Keep Riding
News Analysis  
11/22/2017   Post a comment
Uber's latest breach revelations offer lessons in how not to respond to a breach. Is it a good thing, or a bad thing, that customers don't seem to care?
Common Sense Means Rethinking NIST Password Rules
News Analysis  
11/21/2017   Post a comment
NIST has provided guidance on passwords but those rules conflict with the real world. The world isn't changing, so the guidance should shift.
10 Clues That Network Traffic Is Bad
News Analysis  
11/16/2017   Post a comment
Threats often come in the form of bad network traffic. These 10 tips tell you whether bad traffic is worth worrying about.
GDPR: Broad, Complex & Coming Soon
News Analysis  
11/9/2017   1 comment
GDPR will likely have an impact on your business very soon whether or not you have a location in the EU.
A New Fence: The Software-Defined Perimeter
News Analysis  
10/31/2017   5 comments
The network perimeter is dead: Long live the new perimeter! The boundary of your enterprise network can now be defined by software – but is that the right answer for your organization?
The 5 Nightmare (Breaches) Before Halloween
News Analysis  
10/30/2017   7 comments
You're going to be hit by a breach. Which one, and in what guise it comes, will determine just how scary it's going to be.
Ways to Win the Security Skills Challenge
News Analysis  
10/26/2017   3 comments
Finding and keeping skilled security professionals is hard. But there are ways that can work to keep your best employees on-board and happy.
Can the IoT Be More Secure?
News Analysis  
10/19/2017   1 comment
The IoT has lots of insecurity built in – but here are some ways to make it more secure.
Security by Discomfort
News Analysis  
10/12/2017   3 comments
If you want to bridge the talent gap, look beyond the usual pool of corporate candidates to fill infosec positions.
Where Should Security Live?
News Analysis  
10/6/2017   3 comments
Security can sit in many locations. Where is the best spot for your organization's security center?
Simple Steps to Online Safety for Cybersecurity Awareness Month
News Analysis  
10/4/2017   12 comments
National Cybersecurity Awareness Month is a great time to give your users a new list of security tips.
Security Takes On Malicious DNA (Files)
News Analysis  
9/28/2017   4 comments
Securing biomedical research can mean protecting systems from malicious code in the samples under investigation.
NIST Redefines the Good Password
News Analysis  
9/22/2017   7 comments
NIST has offered new guidelines for best practices in passwords.
Insider Threats: Defense in All Directions
News Analysis  
9/11/2017   1 comment
In order to get ahead of insider threats you have to look in every direction.
Think You Know Hackers? Think Again
News Analysis  
9/8/2017   6 comments
Hackers are more than the stereotypes. This list gets you started on understanding those who understand your IT systems.
Women Will Solve the Cybersecurity Skills Shortage
News Analysis  
9/6/2017   Post a comment
If you need more cybersecurity professionals there's an untapped pool of candidates: women with great technical skills.
Big IoT Security Benefits From Service Providers Thinking Small
News Analysis  
8/31/2017   1 comment
It doesn't take many bad devices to wreck a network. Concentrating on a small number of miscreants can reap huge benefits for service providers.
VMware Offers App Security From the 'Goldilocks Zone'
News Analysis  
8/28/2017   16 comments
Making good on a theme pitched by Martin Casado and Tom Corn, VMware launches AppDefense to put the hypervisor at the heart of application security.
Closing Gaps in DNS
News Analysis  
8/25/2017   1 comment
Everyone uses DNS. How can you prevent hackers from using it to disrupt your business?
Unpacking Packed Malware
News Analysis  
8/24/2017   1 comment
Executable compression is a common technique for hiding malware. The question is, what can you do to unpack the threat?
'Good Enough' Probably Isn't
News Analysis  
8/21/2017   2 comments
Enterprise cyber defense needs to get better unless we want to see the executive revolving door spin even faster.
Digital Identity Will Drive Revenue & Reduce Risk
News Analysis  
8/17/2017   1 comment
Trusting the human behind the device can be as important as trusting the device in secure applications.
Magical Thinking Drives the Myth of AI Solving Security
News Analysis  
8/16/2017   13 comments
AI is being called the solution to future security problems, but we shouldn't rely on the technology for too much, too soon.
Lawyers Are Friends, Not Foes
News Analysis  
8/10/2017   Post a comment
When it comes to security allies, your corporate counsel should top the list.
Want to Be a Ransomware Victim? Pay Up
News Analysis  
8/3/2017   5 comments
Experience shows that the fastest way to become a repeat victim of ransomware is to pay ransom the first time.
How Secure Are Your IoT Devices?
News Analysis  
8/2/2017   6 comments
The IoT can be a huge attack surface: What are you doing to keep your smart devices free from stupid security faults?
Personal Security Begets Enterprise Security
News Analysis  
7/20/2017   2 comments
Employees' personal approach to information security is fundamentally crucial to their organizations' security posture. Accordingly, enterprises would do well to learn from recent hacks and rethink the way they train their employees in cybersecurity matters.
Small Businesses Need Secure ISPs
News Analysis  
7/7/2017   4 comments
Small businesses can't do it alone: They need secure services from ISPs and MSPs to survive today's hostile environment.
Are You Ready for GDPR?
News Analysis  
7/6/2017   1 comment
Multi-cloud and software-defined storage solutions may ease the way to GDPR compliance.
The Stress of Being CISO
News Analysis  
7/3/2017   3 comments
The title 'CISO' carries with it some serious stress. A new poll talks about that stress and what to do about it.
WannaCry Was Just the Beginning
News Analysis  
6/29/2017   20 comments
Petya proves that WannaCry is just the beginning of a new, far more serious type of cyberattack.
Five Questions for Healthcare Security
News Analysis  
6/26/2017   24 comments
Healthcare security regulations come with teeth. Five questions can help healthcare CISOs from being bitten.
Get Used to It: AI Will Extract Every Penny It Can
News Analysis  
6/23/2017   16 comments
It may not be fair, but it's the future.
False Positives Have Real Consequences
News Analysis  
6/22/2017   17 comments
False positives are more than just annoying – they can seriously disrupt your cybersecurity efforts.
Nothing's Certain, Except Death, Taxes... & Phishing
News Analysis  
6/21/2017   44 comments
Recent phishing attacks could mean that a tax bill is the least of your government revenue issues.
Deciphering the Threat Landscape
News Analysis  
6/19/2017   Post a comment
Why do we continue to see so many cyberbreaches? If we look at why many of the breaches in the past year have occurred, it comes down to three major factors.
Machine Learning Is the Next Great Security Weapon
News Analysis  
6/14/2017   5 comments
Enlisting machines will help level the playing field in the battle for enterprise cybersecurity.
Fixing the Tech Behind the Cyberwar
News Analysis  
6/13/2017   7 comments
As security, we have failed our very charges. We continue to allow them to be attacked and we fail at defense. What must we do to change this?
Autonomous Cars Must Be Secure to Be Safe
News Analysis  
6/13/2017   29 comments
All of the airbags and crumple zones in the world won't help if hackers can take control of self-driving cars. What can manufacturers do to keep these next-generation vehicles secure and safe?
From Enemies to Allies: Addressing Security Culture Clashes in Your Organization
News Analysis  
6/9/2017   Post a comment
Building secure organizations starts with people, not technology. Part 2 of a 2-part article.
Effective Leadership Means Effective Security
News Analysis  
6/7/2017   Post a comment
Raising security awareness across the enterprise requires diligence, leadership and contextual threat intelligence, and it starts in the C-suite.
The Security of SD-WAN
News Analysis  
6/5/2017   Post a comment
With Software-Defined WAN (SD-WAN), lower costs and increased efficiency are the big payoffs. Is there a price to be paid in security?
Your Security Problem Isn't Technical, It's Personal
News Analysis  
6/1/2017   1 comment
Finding a solution starts with admitting that there's a problem. In cybersecurity, the process should start with people, not technology.
Heavy Reading Launches a Security Market Tracker
News Analysis  
5/10/2017   Post a comment
As increasing numbers of telecom operators venture into the managed security space, Heavy Reading has launched a new research service that monitors and analyzes this emerging sector.
First AWS, Now Microsoft Cloud; Who's Next?
News Analysis  
5/4/2017   Post a comment
Outages are inevitable, but how can we deal with them better?
Security, Cloud & the SBC
News Analysis  
3/27/2017   Post a comment
Despite all the current hype surrounding 5G at the moment, it's cloud and security technologies that are fundamentally driving business growth opportunities for communications service providers.
CenturyLink: Changing the Security Mindset
News Analysis  
3/10/2017   Post a comment
Businesses need to think of cyber security as more than an occasional investment.
Pay-TV Security Gets 50 Shades Darker
News Analysis  
3/2/2017   Post a comment
Pay-TV providers are seeing new security threats and vulnerabilities every day, and are facing numerous challenges trying to tighten the security that protects organizations, as well as their customers.
Machine Learning at Heart of Security M&A Splurge
News Analysis  
2/8/2017   Post a comment
Four acquisitions in a week all point to the growing importance of machine learning for major security system vendors.
Nokia's Efforts to Lead in Security
News Analysis  
2/2/2017   Post a comment
Nokia is maintaining its strategic emphasis on network security and may have some plausible claims to be ahead of its major vendor rivals – but it still has a lot of questions to answer.

Latest Articles
The news from Uber is rippling across the business landscape. Executives and leaders have a variety of responses to the breach and its aftermath. Here's a roundup of some of those reactions.
If your personal information is available on the Internet, you should assume that a hacker has it.
Facial recognition is starting to grow as a technology on consumer devices; what does that mean for your enterprise security?
An industry alliance has introduced Quad9, a free DNS service that can protect users from phishing, bots and malware websites.
A cautionary note for the season in this week's Friday Haiku.
Flash Poll
upcoming Webinars
Microsegmentation: A Better Way to Protect Application Workloads & Secure Data
Thursday, November 30, 2017
1:00 p.m. EST / 10:00 a.m. PST
A Look Ahead to Security 2018
Tuesday, December 19, 2017
12:00 p.m. New York / 5:00 p.m. London
Information Resources
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with