Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Larry Loeb Author, | 5/18/2018
First there was the Rowhammer problem. Researchers at Google identified a way that the RAM of a computer could be altered in its state -- bit flips -- to gain kernel privileges on x86-64 Linux when run as an unprivileged userland process.
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 5/17/2018
It was just over a year ago that the WannaCry malware stormed across the globe, infecting hundreds of thousands of vulnerable Windows PCs, throwing the operations of such major organizations as the UK National Health Service, car makers Nissan Renault, delivery company FedEx and mobile communications giant Telefonica into disarray, and putting the world ...
Cover Image
Alan Zeichick Principal Analyst, Camden Associates, | 5/16/2018
No more pizza boxes: Traditional hardware firewalls can't protect a modern corporate network and its users. Why? Because while there still may be physical servers inside an on-premises data center or in a wiring closet somewhere, an increasing number of essential resources are virtualized or off-site.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 5/14/2018
President Donald Trump seemed to throw a lifeline to ZTE on Sunday in the form of a tweet, writing that he would work with the president of China to help rescue the company following crippling sanctions issued by the US Commerce Department.
Cover Image
Jeffrey Burt Freelance Editor & Journ, | 5/10/2018
Business users and consumers alike are increasingly turning to their mobile devices for their computing needs, and where they go, hackers are sure to follow.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 5/9/2018
The 2017 data breach at Equifax, which affected more than 146 million of the company's customers, is considered one of the largest incidents of its kind. Now, new documents are laying bare how vast the breach actually was.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 5/4/2018
Get ready for a new generation of Spectre vulnerabilities to appear in x86 chips.
Cover Image
Larry Loeb Author, | 5/4/2018
Positive Technologies has come up with a research report that anyone with responsibility for a network supporting an industrial facility should find worrisome.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 5/3/2018
A new vulnerability in software made by Schneider Electric could make power plants and other industrial-grade facilities susceptible to remote attacks and sabotage, according to new research published this week.
discussion board
Chat
Information Resources
upcoming Webinars
Cloud Access Security Brokers in the Wild
Wednesday, May 30, 2018
1:00 p.m. EST / 10:00 a.m. PST
Flash Poll
Video
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
Join editor Curt Franklin as he talks with Cricket Liu, head of DNS for Infoblox about the security implications of DNS -- one of the foundation services of the web.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with