Sign up for our weekly newsletter!
News & Views
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 7/17/2018
A mobile malware attack is targeting iPhone users in India by tricking them into downloading open source, mobile device management (MDM) software that can take control of the smartphone and reveal personal data, as well as location, according to a new report.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 7/17/2018
After months of uncertainty, concerns about national security and some hefty fines, ZTE is now clear to return to business after the US reversed course on its component ban.
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 7/10/2018
The high-profile data protection rules in Europe -- talked about for several years and now finally in force for a little more than a month -- could bring about some much-needed changes in privacy and data management policies, according to Cisco's top privacy official.
Cover Image
Larry Loeb Author, | 7/4/2018
A new report by security researchers at Ruhr-University Bochum and New York University Abu Dhabi has shown how the data link layer of the 4G LTE mobile telephony standard can be defeated.
Cover Image
Jeffrey Burt Editor & Journalist, | 7/3/2018
David Goeckeler, executive vice president and general manager of networking and security at Cisco, was speaking with a room full of journalists at the recent Cisco Live 2018 show when the topic turned to network segmentation and automation.
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 6/29/2018
Cybercriminals who had targeted Android mobile device users twice over the past two years with fraudulent apps in the Google Play app store are at it again. Earlier this year, the group came out with a third effort, using silent push notifications in the background to subscribe users to a premium-rate mobile service.
Cover Image
Larry Loeb Author, | 6/29/2018
Distil Networks is a security company that has made bot defense one of its main areas of concern. While the firm seems to be reputable -- StubHub, Lufthansa and Verizon are listed among its clients -- the company's views on bots must be viewed within the context of the business.
Cover Image
Carol Wilson Editor-at-large, | 6/28/2018
CenturyLink is enhancing its Security Log Monitoring offering to specifically address hybrid networking environments, the shift of workloads to the cloud and the increased mobility of the workforce by offering a single view of hundreds of common log source types.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 6/19/2018
Over the first six months of this year, cybercrimes involving cryptocurrency have overtaken ransomware as the biggest current threat facing enterprise security professionals, whether it's attackers planting malware on devices to mine the virtual currency or any number of cryptojacking schemes.
discussion board
Flash Poll
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
Join editor Curt Franklin and guest Rebekah Brown, threat intelligence lead at Rpaid7, as they discuss the the most important news at one of the largest security conferences of 2017.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with