Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Larry Loeb Author, | 1/28/2020
Remote Desktop Gateway (RDG) (which has also been called Terminal Services Gateway) is a Windows Server component that provides address routing for Remote Desktop (RDP). Users connect and authenticate to the gateway instead of directly to an RDP server. RDG will forward remote RDP traffic to an address that is specified by the user. The idea here is that ...
Cover Image
Larry Loeb Author, | 1/6/2020
Cisco's Data Center Network Manager (DCNM) has been found to be in a world of trouble, racking up three critical authentication bypass vulnerabilities at the top of the list of 12 separate problems that were announced on January 2, 2020. These three have a CVSS of 9.8 out of 10, so they are serious.
Cover Image
Larry Loeb Author, | 12/23/2019
Positive Technologies has issued a report on the emerging security problems of 5G signaling networks titled "5G Signaling Networks: Blast From the Past." The title is descriptive of the central thesis of the report, that backwards compatibility will allow the security mistakes of the past to be carried forward into the next generation of mobile usage.
Cover Image
Steve Durbin Managing Director, Information Security Forum, | 12/23/2019
In the year ahead, organizations of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected, high-impact cybersecurity events. To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function, since ...
Cover Image
Larry Loeb Author, | 12/11/2019
The Sophos Managed Threat Response (MTR) team and SophosLabs researchers have been investigating an ongoing ransomware campaign from Russian threat actors called Snatch for about a year. It was highly targeted to high-payout victims, and seemed the work of financially oriented attackers.
Cover Image
Larry Loeb Author, | 12/10/2019
The Federal Bureau of Investigation's office in Portland, Oregon has started an effort that it calls "Tech Tuesday" to disseminate actionable security advice to users. Last week it got around to the Internet of Things (IoT).
Cover Image
Larry Loeb Author, | 12/5/2019
Omer Tsarfati and his team at security firm CyberArk are now finally able to discuss a major OAuth 2.0 vulnerability that affects Microsoft Azure web services which they have been sitting on since October, according to their timeline.
Cover Image
Larry Loeb Author, | 12/4/2019
Diana Kelley and Seema Kathuria of Microsoft would like to remind you that unlike wide-angle phishing, "spear fishing" is very highly targeted phishing. If it shows up for a user, someone was trying to put it there.
Cover Image
Larry Loeb Author, | 11/14/2019
In the security arena, much of the effort a team will expend centers around the continual process of identifying and understanding the details of the methodology employed by the novel attacks that keep showing up.
discussion board
Markowete
Markowete, 1/28/2020 1:37:07 PM
≤≈≥ INDIA +91-9694510151 INter caste love marriage problem solution IN Guwahati.Solapur
gipertox N+DmuD.50D degrees

Post Your Reply
Chat
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with