Most Commented Content posted in August 2017
Friday Haiku: Fear the Zombie Server
Curt Franklin  
8/25/2017   26 comments
DDoS attacks are lurking in armies of zombie servers.
Millions of Email Addresses Exposed in Latest Malware Database
Curt Franklin  
8/30/2017   23 comments
A database housed in the Netherlands is found to contain hundreds of millions of hacked email addresses.
How to Panic Over IT Security
Larry Loeb  
8/9/2017   18 comments
Anyone can keep calm and carry on. To panic properly takes planning. Here's our tongue-in-cheek primer on doing it right.
Black Hats Win: Results From the Latest Poll
Curt Franklin  
8/28/2017   16 comments
The hat you wear as a security researcher matters, say those who took the latest poll. And the most effective hat color is black.
Automation Deserves Skepticism
Curt Franklin  
8/29/2017   15 comments
While automation might be the next great tech wave, let's take some time to consider it.
Google: Big Cloud, Tiny Titan Chip
Simon Marshall  
8/25/2017   11 comments
Google develops a tiny chip to close a big security hole before it opens. Is there a tiny Titan in your future, too?
Delaware Requires Data Security in New Law
Curt Franklin  
8/23/2017   10 comments
Delaware has become the latest state requiring companies to protect private data.
Bitcoin Attacks Mount as Criminals & States Seek Targets
Simon Marshall  
8/29/2017   9 comments
Bitcoin and other cryptocurrencies are under increasing attack from a variety of actors and it looks like things will only get worse.
India & Pakistan: Commonplace Exploits Access High-Value Information
Simon Marshall  
8/28/2017   6 comments
India and Pakistan are proving yet again that it doesn't take an advanced attack to yield big results.
Programmed to Kill: The Risk of Hacked Robots Is Real
Simon Marshall  
8/24/2017   5 comments
When will the news break of the first hacked robot taking a human life? It could be sooner than you think.
Women in Information Security: Voice of Security Radio
Curt Franklin  
8/1/2017   5 comments
Join Curt Franklin as he talks with Kate Kuehn, head of security practice for BT Americas, about the role of the CISO and the possibilities in a more diverse workforce.
The Friday Haiku: Old-Fashioned Security
Curt Franklin  
8/4/2017   4 comments
A Friday InfoSec haiku.
LookingGlass Raises $26.3M to Bring Order to Chaos
Simon Marshall  
8/31/2017   4 comments
New threat-intelligence-as-a-service company raises the stakes on scale in the market.
HONEST Poll Results: When Should You Pay the Ransom?
Curt Franklin  
8/7/2017   3 comments
When ransomware hits, when should you just pay up? The Security Now community has spoken.
Friday Haiku: On the Path
Curt Franklin  
8/11/2017   3 comments
This week's Friday Haiku looks beyond agile.
Amazon S3 Errors Hit Home Again
Curt Franklin  
8/21/2017   3 comments
Another S3 data release shows the critical importance of correctly configuring the cloud storage service.
Voice of Security Radio: Building Secure Applications
Curt Franklin  
8/22/2017   2 comments
In too many companies, security vulnerabilities start at the application. Join us for this week's episode to hear how to make your applications more secure.
Questions of Colors
Curt Franklin  
8/18/2017   2 comments
A Friday Haiku asks about the color of your hat.
DDoS Trends Show Big Impact From Fewer Servers
Curt Franklin  
8/25/2017   2 comments
A change in control networks means that this quarter saw DDoS attacks from fewer endpoints, each having a bigger impact.
Obscurity Hampers Security: The Latest Survey
Curt Franklin  
8/11/2017   2 comments
Lack of visibility is the number one obstacle to security, according to a new study released this week.
Government Insiders Are Security's Biggest Risk
Simon Marshall  
8/24/2017   2 comments
Outside actors can be dangerous, but the biggest risk to organizations comes from within.
Sleepless in Cupertino
Larry Loeb  
8/21/2017   1 comment
A hacker finds the key to Apple's SEP and there's good news in the battle against spear-phishing. Bad news and good to start the week.
Will GDPR Be the Death of Big Data?
Andy Patrizio  
8/16/2017   1 comment
The EU's General Data Protection Regulation (GDPR) will make the landscape shift for big data users around the world.
Cybercrime Is North Korea's Biggest Threat
Andy Patrizio  
8/17/2017   1 comment
While the world is watching a battle of words, North Korea has been attacking the West and funding its global operations through cybercrime.
DevSecOps: Security in the Process
Curt Franklin  
8/15/2017   1 comment
Can building security into the process make everything more secure? Proponents of DevSecOps say 'Yes.'
Voice of Security Radio: Finding Flaws in the IoT
Curt Franklin  
8/15/2017   1 comment
Can we crowdsource our way to IoT security? Join editor Curt Franklin and Bugcrowd's Casey Ellis as they talk about the possibilities.
Rackspace Strengthens Its Managed Security Story
Curt Franklin  
8/17/2017   1 comment
Rackspace is adding features and functions to its managed security offerings. Is it all a company needs?
WannaCry Hero in FBI Custody
Curt Franklin  
8/7/2017   1 comment
Marcus Hutchins, the researcher who killed WannaCry, was arrested last week in Las Vegas. Should his arrest send a chill over the researcher community?
Voice of Security Radio: In the Name (Server) of Security
Curt Franklin  
8/8/2017   1 comment
Join Curt Franklin and his guest, Cricket Liu of Infoblox, as they talk about DNS's role in security.
Defining DevOps for the Enterprise
Curt Franklin  
8/9/2017   1 comment
Is there anything in the DevOps methodology that makes it impossible to use for secure development? To get the answer, first you have to define DevOps.

Latest Articles
Cisco's research has proven that beyond meeting compliance requirements, good privacy is good for business and individuals.
Once again, a novel 'speculative execution side-channel' attack has been discovered by researchers.
Security researchers have found that the implementation in Remote Desktop Gateway of string segmentation lays it open to memory corruption vulnerabilities.
In Q4 of 2019, the average ransom payment increased by 104% to $84,116, finds Coveware report.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Information Resources
upcoming Webinars
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with