Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Larry Loeb Author, | 12/15/2017
Two incidents that occurred over three hours on December 12 showed how vulnerable the Internet remains to misrouting.
Cover Image
Mike O’Malley Vice President of Carrier Strategy and Business Development at Radware, | 12/14/2017
One of the biggest myths about cyber attacks is that they only happen to large companies. Sure, larger organizations get more than their fair share of headlines. Whether it's stolen user data, ransomware shutdowns, or DDoS attacks that cut off access to some of the Internet's most popular sites, larger organizations' inability to respond to cyber threats ...
Cover Image
Simon Marshall Technology Journalist, | 12/14/2017
Enterprises will start 2018 with plenty of metaphorical desk space for teams to plan their approach to what could be the toughest cybersecurity year on record. But it's the number of empty seats around the desks that will cause most alarm.
Cover Image
Srivats Ramaswami CTO at 42Q, | 12/13/2017
Manufacturers deal with sensitive data each and every day. This includes test and quality data, warranty information, device history records, and especially the engineering specifications for a product that are highly confidential. Trusting that data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully ...
Cover Image
Paul Shomo Sr. Technical Manager, 3rd Party Technologies at OpenText, | 12/12/2017
Hackers and analysts do battle with tools and techniques that are constantly evolving. Cybersecurity is an arms race, but it's not a fair one: the bad guys get endless "do overs" during the attack, yet a single InfoSec mistake could invite a breach. This burden of consistency is probably why the good guys are losing. However, something new is coming over ...
Cover Image
Giora Engel Vice President of Product Management, Palo Alto Networks, | 12/7/2017
A decade ago, countless single-purpose appliances cluttered enterprise networks. Network engineers created complex high-availability architectures to accommodate the firewalls, intrusion detection systems, secure web gateways, anti-virus gateways, anti-spam appliances and more that safeguarded network traffic.
Cover Image
Larry Loeb Author, | 12/6/2017
As the classic Emerson, Lake and Palmer song goes: "Welcome back, my friends, to the show that never ends." Only this time, it's the Crypto Wars that are being refought.
Cover Image
Larry Loeb Author, | 12/4/2017
Ankit Anubhav of Newsky Security, a firm that specializes in Internet of Things security, has found something troubling in his research.
Cover Image
Curtis Franklin Security Editor, | 12/1/2017
There's a new mobile device wandering around inside your network and it's going to have an effect on your security. If you want to know where it is, just look to the end of your employees' arms.
discussion board
Chat
Information Resources
Flash Poll
upcoming Webinars
A Look Ahead to Security in 2018
Tuesday, December 19, 2017
12:00 p.m. New York / 5:00 p.m. London
Video
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
Join editor Curt Franklin as he talks with Cricket Liu, head of DNS for Infoblox about the security implications of DNS -- one of the foundation services of the web.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with