Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 5/18/2018
For the second time this year, researchers at McAfee Labs have found malware hiding in the Google Play store that seems to target North Korean dissidents by attempting to plant spyware on their Android mobile devices.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 5/17/2018
With the deadline for the European Union's General Data Protection Regulation (GCPR) looming later this month, businesses of all sizes continue to scramble to meet the new requirements and avoid a possible fine.
Cover Image
Alan Zeichick Principal Analyst, Camden Associates, | 5/16/2018
No more pizza boxes: Traditional hardware firewalls can't protect a modern corporate network and its users. Why? Because while there still may be physical servers inside an on-premises data center or in a wiring closet somewhere, an increasing number of essential resources are virtualized or off-site.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 5/14/2018
IBM is looking to create a more secure internal environment by reportedly banning all USB drives, as well as other portable storage devices, for its employees. The company is, instead, encouraging workers to use the company's cloud-based file and data sharing service to move data around internally.
Cover Image
Larry Loeb Author, | 5/11/2018
Microsoft announced at its Build 2018 conference this week -- and in a blog post -- that it was going to add custom functionality locally in Excel spreadsheets through JavaScript.
Cover Image
Larry Loeb Author, | 5/9/2018
Safe Links is a program run by Microsoft as part of the Office 365 Advanced Threat Protection (ATP) effort. What it does is to check URLs that may be embedded inside an email, attempting to see if they are malicious by comparing them to a known blacklist.
Cover Image
Simon Marshall Technology Journalist, | 5/7/2018
Enterprises trying to protect their endpoints are up against it. Employees who bring their own devices to work, new threats from phishing and legacy servers and workstations all present a big target for the bad guys. There's also the need to protect data in newer endpoints in the cloud.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 5/4/2018
Get ready for a new generation of Spectre vulnerabilities to appear in x86 chips.
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 5/3/2018
It's no secret in enterprises that end users can be the largest security threat in an organization, and that passwords often are the way hackers get into the corporate network.
discussion board
Chat
Information Resources
upcoming Webinars
Cloud Access Security Brokers in the Wild
Wednesday, May 30, 2018
1:00 p.m. EST / 10:00 a.m. PST
Flash Poll
Video
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
Join editor Curt Franklin as he talks with Cricket Liu, head of DNS for Infoblox about the security implications of DNS -- one of the foundation services of the web.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with