Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Simon Marshall Technology Journalist, | 10/19/2017
Europe's influence in US data protection law will soon prove whether businesses that hold personally identifiable information (PII) can meet the new General Data Protection Regulations (GDPR), currently awaiting launch in the US after the EU-US Privacy Shield act was ratified Wednesday by the EU.
Cover Image
Curtis Franklin Security Editor, | 10/17/2017
By this time you've probably heard about the KRACK attack, and what you've heard is right. This one is bad, and it's everywhere.
Cover Image
Simon Marshall Technology Journalist, | 10/17/2017
Hackers heading into an enterprise have another reason to be cautious: they could become the hunted, not the hunter. In a kind of cyber bait-and-switch, valuable data turns out to fake, and the trap is sprung. More and more enterprises are becoming interested in so-called deception technology, designed to turn the tables on attackers.
Cover Image
Larry Loeb Author, | 10/16/2017
How a website can make money for someone has been a concern since the web began. The first answer that emerged was a port of the kind of advertisement that might be seen in a newspaper, but on a web page. Just charging someone for displaying it didn't work out so well, so tying that ad to traffic generated for the advertiser -- the click-through -- was ...
Cover Image
Michael Wood Vice President - Marketing, VeloCloud Networks, | 10/6/2017
How do you protect your family in dangerous times?
Cover Image
Curtis Franklin Security Editor, | 10/6/2017
ORLANDO, Fla. -- Gartner Symposium/ITXpo -- Security is a practical discipline. Sure, we can talk big ideas and lofty goals, but if the practice that calls itself "security" doesn't keep an organization's assets safe, then it's failing at its job.
Cover Image
Larry Loeb Author, | 10/5/2017
Most computer attacks will focus on the overlying software that controls the computer. Finding some way to subvert that software will give the attacker a means to exert control on the underlying machine. The complexities inherent in a modern, extensible operating control program is what gives an attacker possible niches to exploit.
Cover Image
Curtis Franklin Security Editor, | 10/3/2017
ORLANDO -- Gartner Symposium/ITXpo -- Enterprise security is not immune to trends and the whims of fashion. Some trends are driven by external forces, like the ever-evolving threats from clever hackers, while others are driven from within the organization. At an opening-day session at Gartner Symposium, research director Brian Reed led a discussion ...
Cover Image
Simon Marshall Technology Journalist, | 10/3/2017
It's National Cybersecurity Awareness Month (NCSAM), and the National Cyber Security Alliance (NCSA) and the US Department of Homeland Security want everyone to know that securing the Internet is everyone's job. It's a noble sentiment and one consumers need to hear: not literally going out there and securing it themselves, but at least behaving wisely ...
Latest comment: @michelle I hear you.
discussion board
Chat
Flash Poll
upcoming Webinars
ARCHIVED
Agility, Scalability & Automation – Enabling Digital Transformation Through the ADC
Thursday, October 12, 2017
11:00 a.m New York/ 4:00 p.m. London
Information Resources
Video
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
Join editor Curt Franklin as he talks with Cricket Liu, head of DNS for Infoblox about the security implications of DNS -- one of the foundation services of the web.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with