Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Curtis Franklin Security Editor, | 10/19/2017
Encryption can save an enterpise and its data. Right now, though, the question is who's going to save encryption.
Cover Image
Simon Marshall Technology Journalist, | 10/19/2017
Europe's influence in US data protection law will soon prove whether businesses that hold personally identifiable information (PII) can meet the new General Data Protection Regulations (GDPR), currently awaiting launch in the US after the EU-US Privacy Shield act was ratified Wednesday by the EU.
Cover Image
Michal Salát Threat Intelligence Director, Avast, | 10/19/2017
In today's digital world, we are literally surrounded by "smart" devices, or Internet of Things (IoT) devices. Making devices smart is a trend to be applauded, but there is one very important thing that is frequently an afterthought: security.
Cover Image
Curtis Franklin Security Editor, | 10/17/2017
By this time you've probably heard about the KRACK attack, and what you've heard is right. This one is bad, and it's everywhere.
Cover Image
Simon Marshall Technology Journalist, | 10/17/2017
Hackers heading into an enterprise have another reason to be cautious: they could become the hunted, not the hunter. In a kind of cyber bait-and-switch, valuable data turns out to fake, and the trap is sprung. More and more enterprises are becoming interested in so-called deception technology, designed to turn the tables on attackers.
Cover Image
Larry Loeb Author, | 10/16/2017
How a website can make money for someone has been a concern since the web began. The first answer that emerged was a port of the kind of advertisement that might be seen in a newspaper, but on a web page. Just charging someone for displaying it didn't work out so well, so tying that ad to traffic generated for the advertiser -- the click-through -- was ...
Cover Image
Michael Wood Vice President - Marketing, VeloCloud Networks, | 10/6/2017
How do you protect your family in dangerous times?
Cover Image
Curtis Franklin Security Editor, | 10/6/2017
ORLANDO, Fla. -- Gartner Symposium/ITXpo -- Security is a practical discipline. Sure, we can talk big ideas and lofty goals, but if the practice that calls itself "security" doesn't keep an organization's assets safe, then it's failing at its job.
Cover Image
Larry Loeb Author, | 10/5/2017
Most computer attacks will focus on the overlying software that controls the computer. Finding some way to subvert that software will give the attacker a means to exert control on the underlying machine. The complexities inherent in a modern, extensible operating control program is what gives an attacker possible niches to exploit.
discussion board
Chat
Information Resources
Flash Poll
upcoming Webinars
ARCHIVED
Agility, Scalability & Automation – Enabling Digital Transformation Through the ADC
Thursday, October 12, 2017
11:00 a.m New York/ 4:00 p.m. London
Video
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Radio Shows
Join editor Curt Franklin as he talks with Cricket Liu, head of DNS for Infoblox about the security implications of DNS -- one of the foundation services of the web.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with