Content posted in August 2017
LookingGlass Raises $26.3M to Bring Order to Chaos
Simon Marshall  
8/31/2017   4 comments
New threat-intelligence-as-a-service company raises the stakes on scale in the market.
Millions of Email Addresses Exposed in Latest Malware Database
Curt Franklin  
8/30/2017   23 comments
A database housed in the Netherlands is found to contain hundreds of millions of hacked email addresses.
Automation Deserves Skepticism
Curt Franklin  
8/29/2017   15 comments
While automation might be the next great tech wave, let's take some time to consider it.
Bitcoin Attacks Mount as Criminals & States Seek Targets
Simon Marshall  
8/29/2017   9 comments
Bitcoin and other cryptocurrencies are under increasing attack from a variety of actors and it looks like things will only get worse.
India & Pakistan: Commonplace Exploits Access High-Value Information
Simon Marshall  
8/28/2017   6 comments
India and Pakistan are proving yet again that it doesn't take an advanced attack to yield big results.
Black Hats Win: Results From the Latest Poll
Curt Franklin  
8/28/2017   16 comments
The hat you wear as a security researcher matters, say those who took the latest poll. And the most effective hat color is black.
Google: Big Cloud, Tiny Titan Chip
Simon Marshall  
8/25/2017   11 comments
Google develops a tiny chip to close a big security hole before it opens. Is there a tiny Titan in your future, too?
DDoS Trends Show Big Impact From Fewer Servers
Curt Franklin  
8/25/2017   2 comments
A change in control networks means that this quarter saw DDoS attacks from fewer endpoints, each having a bigger impact.
Friday Haiku: Fear the Zombie Server
Curt Franklin  
8/25/2017   26 comments
DDoS attacks are lurking in armies of zombie servers.
Programmed to Kill: The Risk of Hacked Robots Is Real
Simon Marshall  
8/24/2017   5 comments
When will the news break of the first hacked robot taking a human life? It could be sooner than you think.
Government Insiders Are Security's Biggest Risk
Simon Marshall  
8/24/2017   2 comments
Outside actors can be dangerous, but the biggest risk to organizations comes from within.
DoJ Narrows Scope of DreamHost Warrant
Curt Franklin  
8/23/2017   Post a comment
The Department of Justice has scaled back the demands of a search warrant served to web hosting provider DreamHost.
Delaware Requires Data Security in New Law
Curt Franklin  
8/23/2017   10 comments
Delaware has become the latest state requiring companies to protect private data.
New SaaS Service Offers Order for Access
Curt Franklin  
8/22/2017   Post a comment
One Identity's new SaaS offering, Starling IARI, analyzes user access and roles to secure enterprise networks.
Voice of Security Radio: Building Secure Applications
Curt Franklin  
8/22/2017   2 comments
In too many companies, security vulnerabilities start at the application. Join us for this week's episode to hear how to make your applications more secure.
Amazon S3 Errors Hit Home Again
Curt Franklin  
8/21/2017   3 comments
Another S3 data release shows the critical importance of correctly configuring the cloud storage service.
Sleepless in Cupertino
Larry Loeb  
8/21/2017   1 comment
A hacker finds the key to Apple's SEP and there's good news in the battle against spear-phishing. Bad news and good to start the week.
Finding Tools for DevSecOps
Curt Franklin  
8/18/2017   Post a comment
Finding the right tools can be the start of the right path toward DevSecOps. Here's how to start the hunt.
Questions of Colors
Curt Franklin  
8/18/2017   2 comments
A Friday Haiku asks about the color of your hat.
Cybercrime Is North Korea's Biggest Threat
Andy Patrizio  
8/17/2017   1 comment
While the world is watching a battle of words, North Korea has been attacking the West and funding its global operations through cybercrime.
Rackspace Strengthens Its Managed Security Story
Curt Franklin  
8/17/2017   1 comment
Rackspace is adding features and functions to its managed security offerings. Is it all a company needs?
Will GDPR Be the Death of Big Data?
Andy Patrizio  
8/16/2017   1 comment
The EU's General Data Protection Regulation (GDPR) will make the landscape shift for big data users around the world.
Voice of Security Radio: Finding Flaws in the IoT
Curt Franklin  
8/15/2017   1 comment
Can we crowdsource our way to IoT security? Join editor Curt Franklin and Bugcrowd's Casey Ellis as they talk about the possibilities.
DevSecOps: Security in the Process
Curt Franklin  
8/15/2017   1 comment
Can building security into the process make everything more secure? Proponents of DevSecOps say 'Yes.'
Looking Back on Security: The Week of August 7, 2017
Larry Loeb  
8/14/2017   Post a comment
What do you need to know about what happened in security last week? This article gives you the news.
Obscurity Hampers Security: The Latest Survey
Curt Franklin  
8/11/2017   2 comments
Lack of visibility is the number one obstacle to security, according to a new study released this week.
Friday Haiku: On the Path
Curt Franklin  
8/11/2017   3 comments
This week's Friday Haiku looks beyond agile.
Defining DevOps for the Enterprise
Curt Franklin  
8/9/2017   1 comment
Is there anything in the DevOps methodology that makes it impossible to use for secure development? To get the answer, first you have to define DevOps.
How to Panic Over IT Security
Larry Loeb  
8/9/2017   18 comments
Anyone can keep calm and carry on. To panic properly takes planning. Here's our tongue-in-cheek primer on doing it right.
Voice of Security Radio: In the Name (Server) of Security
Curt Franklin  
8/8/2017   1 comment
Join Curt Franklin and his guest, Cricket Liu of Infoblox, as they talk about DNS's role in security.
HONEST Poll Results: When Should You Pay the Ransom?
Curt Franklin  
8/7/2017   3 comments
When ransomware hits, when should you just pay up? The Security Now community has spoken.
WannaCry Hero in FBI Custody
Curt Franklin  
8/7/2017   1 comment
Marcus Hutchins, the researcher who killed WannaCry, was arrested last week in Las Vegas. Should his arrest send a chill over the researcher community?
The Friday Haiku: Old-Fashioned Security
Curt Franklin  
8/4/2017   4 comments
A Friday InfoSec haiku.
Women in Information Security: Voice of Security Radio
Curt Franklin  
8/1/2017   5 comments
Join Curt Franklin as he talks with Kate Kuehn, head of security practice for BT Americas, about the role of the CISO and the possibilities in a more diverse workforce.

Latest Articles
Cisco's research has proven that beyond meeting compliance requirements, good privacy is good for business and individuals.
Once again, a novel 'speculative execution side-channel' attack has been discovered by researchers.
Security researchers have found that the implementation in Remote Desktop Gateway of string segmentation lays it open to memory corruption vulnerabilities.
In Q4 of 2019, the average ransom payment increased by 104% to $84,116, finds Coveware report.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Information Resources
upcoming Webinars
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with