Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Scott Ferguson Editor, Enterprise Cloud, | 12/15/2017
Researchers at FireEye have identified a new piece of malware that they are calling Triton, which seems to have been designed to target industrial systems, as well as other critical infrastructure, and may have its origins with a nation state.
Cover Image
Simon Marshall Technology Journalist, | 12/15/2017
How many "stealthy admins" does your company have? That is, how many users do you have on a domain discretionary access control list (DACL), who have unnecessarily elevated domain privileges?
Cover Image
Mike O’Malley Vice President of Carrier Strategy and Business Development at Radware, | 12/14/2017
One of the biggest myths about cyber attacks is that they only happen to large companies. Sure, larger organizations get more than their fair share of headlines. Whether it's stolen user data, ransomware shutdowns, or DDoS attacks that cut off access to some of the Internet's most popular sites, larger organizations' inability to respond to cyber threats ...
Cover Image
Simon Marshall Technology Journalist, | 12/12/2017
When looking back at the 2017 threat landscape, what event had the most impact? In a troublesome 12-month retrospective, Kaspersky Lab reckons WannaCry -- indirectly aided by the US National Security Agency -- was the baddest boy on the security block.
Cover Image
Paul Shomo Sr. Technical Manager, 3rd Party Technologies at OpenText, | 12/12/2017
Hackers and analysts do battle with tools and techniques that are constantly evolving. Cybersecurity is an arms race, but it's not a fair one: the bad guys get endless "do overs" during the attack, yet a single InfoSec mistake could invite a breach. This burden of consistency is probably why the good guys are losing. However, something new is coming over ...
Cover Image
Larry Loeb Author, | 12/11/2017
Security researchers from enSilo told attendees at the recent London Black Hat conference that they had some good news and some bad news for many of them.
Cover Image
Bogdan Botezatu senior e-threat analyst, | 12/11/2017
In the past several years, ransomware has inflicted financial losses estimated at billions of dollars -- and that's only what victims have reported to law enforcement. Described by security researchers as one of the most prolific and financially stimulating malware categories, ransomware has successfully been ported to all operating systems (OS), ...
Cover Image
Simon Marshall Technology Journalist, | 12/8/2017
Is it next-generation threat detection? Is it counter-hacking? One thing we know is that it's designed to lure hackers to a replica enterprise environment so that threats can be eliminated. It's deception.
Cover Image
Simon Marshall Technology Journalist, | 12/7/2017
When reviewing the threat landscape of 2017, Equifax will be the most significant compromise since the breach should have been closed-out in advance.
discussion board
Chat
Information Resources
Flash Poll
upcoming Webinars
A Look Ahead to Security in 2018
Tuesday, December 19, 2017
12:00 p.m. New York / 5:00 p.m. London
Video
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
Join editor Curt Franklin and guest Rebekah Brown, threat intelligence lead at Rpaid7, as they discuss the the most important news at one of the largest security conferences of 2017.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with