Content posted in September 2017
Friday Haiku: The Quantum Future
Curt Franklin  
9/29/2017   3 comments
The Friday Haiku reflects on a week in Orlando's heat.
Consumers Think Security When Choosing Brands
Simon Marshall  
9/29/2017   6 comments
Consumers are beginning to pay attention to security reputation when choosing which brands to support.
Authentication Tackles Forests at Microsoft Ignite
Curt Franklin  
9/29/2017   2 comments
Authentication is an issue on a personal computer. It's a complex problem in AD forest management.
Fortanix Has Series A Funding for Run-Time Encryption
Simon Marshall  
9/28/2017   Post a comment
Fortanix has introduced new technology for run-time encryption to protect sensitive data.
Three Reasons Facial Recognition Will Win
Curt Franklin  
9/27/2017   40 comments
Facial recognition technology is coming to a device near you. Here are three reasons it's inevitable.
Deloitte Hack Still Has More Questions Than Answers
Simon Marshall  
9/27/2017   17 comments
The huge hack of global accounting firm Deloitte is still presenting more questions than answers for security professionals.
Microsoft Ignite: 9 Things to Know
Curt Franklin  
9/26/2017   1 comment
Microsoft's largest annual conference, Ignite, is underway in Orlando, Fla. Security Now is there – and here's what we're seeing.
Safety Starts With Data: An Interview With GM's Head of Product Cybersecurity
Simon Marshall  
9/26/2017   Post a comment
An insightful Security Now interview with Jeff Massimilla, vice president global vehicle safety and product cybersecurity at General Motors.
Splunk Ups Machine IQ in Software Updates
Curt Franklin  
9/26/2017   1 comment
Splunk has increased machine intelligence and analytics capabilities in a series of software updates.
Microsoft's Nadella Shares the Future at Ignite
Curt Franklin  
9/25/2017   3 comments
Satya Nadella's keynote address can be boiled down to four phrases or words. Here's what you need to know to get ready for the Microsoft future.
Encryption: 6 Ways to Make It Matter
Curt Franklin  
9/25/2017   7 comments
A Security Now special report provides best practice notes for encryption in the enterprise.
Law Comes to the Self-Driving Wild West, Part 2
Simon Marshall  
9/25/2017   2 comments
Legislators and regulators are scrambling to build a legal framework to support intelligent, connected and self-driving cars.
Right & Wrong Lessons From the Equifax Breach
Curt Franklin  
9/22/2017   12 comments
There are lots of lessons to learn from the Equifax breach. Just make sure you're learning the right ones.
Friday Haiku: Gem or Not?
Curt Franklin  
9/22/2017   4 comments
How will CISOs respond to the pressure of recent breaches? The Friday haiku asks the question.
Law Comes to Self-Driving Wild West
Simon Marshall  
9/22/2017   2 comments
Legislation has begun focusing on the security needs of self-driving cars. Part one of a two-part article.
A New, Invisible Threat Jumps the Air Gap
Curt Franklin  
9/21/2017   4 comments
The infrared capabilities of security cameras provide a new way for attackers to reach systems that have no connection to the Internet.
CISOs Under Fire: New Poll Shows Progress & Peril
Curt Franklin  
9/20/2017   2 comments
A new report by F5 and Ponemon looks at the state of the CISO in modern enterprises.
Survey Finds Companies Don't Know Cloud Security
Curt Franklin  
9/20/2017   2 comments
Companies are worried about security in the public cloud, but a new survey shows they don't understand the basics.
Intent-Based Security Is New Path for Vendors
Curt Franklin  
9/19/2017   2 comments
A growing number of security and networking vendors are talking about intent-based security as a next-gen solution.
CCleaner Infection Reveals Sophisticated Hack
Simon Marshall  
9/19/2017   7 comments
The hack that put malware on an update of a popular security program was not the work of a first-time malware author.
RouteX Hijacks Netgear Routers
Larry Loeb  
9/18/2017   30 comments
Malware called RouteX can give an attacker control of popular wireless routers.
Vigilance Brings Machines & Humans Together to Defeat Threats
Simon Marshall  
9/18/2017   2 comments
Vigilance, from SentinelOne, ties the strengths of humans and machines together in a threat-resolution system.
Protect DNS: A Conversation With Dave Dufour of Webroot
Curt Franklin  
9/15/2017   Post a comment
DNS is vulnerable and must be protected. An interview with Dave Dufour explains the vulnerabilities and some of the protection.
Friday Haiku: No Safety in Bluetooth
Curt Franklin  
9/15/2017   42 comments
Bluetooth's vulnerability might be the biggest security story of the year.
Swirlds Seeks End to Financial Attacks
Simon Marshall  
9/15/2017   Post a comment
Startup Swirlds is promising better-than-blockchain technology for financial transactions.
AWS Elasticsearch Servers Host Malware
Curt Franklin  
9/14/2017   Post a comment
Two strains of POS malware have been using Elasticsearch servers on AWS as hiding places.
BlueBorne Threatens 5 Billion Bluetooth Devices
Curt Franklin  
9/13/2017   1 comment
More than 5 billion devices are vulnerable to a set of eight Bluetooth flaws, even if they aren't in discoverable mode.
Solving the Problems of an Equifax
Simon Marshall  
9/13/2017   2 comments
The Equifax breach has brought problems to businesses and consumers. Here are steps each can take to make it past the emergency.
Equifax Breach Won't Be the Last or Worst
Curt Franklin  
9/13/2017   22 comments
The Equifax breach shows that a major change in personal records is required, according to a senior Gartner analyst.
FaceID Faces Security Headwind
Simon Marshall  
9/12/2017   15 comments
Apple brings facial recognition to the iPhone but some security experts aren't convinced the technology is ready.
Kaspersky & the FBI: Security Meets Politics
Andy Patrizio  
9/12/2017   1 comment
Is the FBI's warning on Kaspersky about politics, security or a bit of both?
Equifax Hacked: Profit Before Protection?
Simon Marshall  
9/11/2017   4 comments
Millions of personal information records were taken from Equifax. What went wrong?
Dragonfly Targets US Nukes
Simon Marshall  
9/8/2017   4 comments
An industrial malware ring targets US nuclear power facilities.
Friday Haiku: A Cat 5 Credit Hack
Curt Franklin  
9/8/2017   5 comments
An Equifax hack is an ill wind for the credit world.
DevOps Security Management Goes Central
Simon Marshall  
9/7/2017   1 comment
CyberArk is taking a centralized view of DevOps security through Conjur.
SANS Study Says Reputation Is a Cyber-Casualty
Curt Franklin  
9/7/2017   1 comment
The latest security study says that you've probably been attacked and your reputation has taken the biggest hit.
BroadSoft Error Exposes TWC PII on AWS S3
Curt Franklin  
9/6/2017   Post a comment
A mis-configured Amazon Web Storage (AWS) instance has once again exposed millions of private customer records to the public Internet. Is it time for companies to re-think the way they're building their AWS buckets?
AI Just Gets Bigger
Simon Marshall  
9/6/2017   2 comments
The market for "friendly" consumer AI continues to expand, but security issues could be lurking in the growth.
Debit Card Fraud Numbers Explode
Simon Marshall  
9/5/2017   2 comments
Technology is making it easier than ever for thieves and scammers to steal debit card numbers – and the bank accounts they access.
Qadium Gets $40M Series B for Internet Visibility
Curt Franklin  
9/5/2017   1 comment
Qadium indexes every device on the public Internet, a technology that's attracted some big-time Silicon Valley investors.
IoT Security Needs Creative Solutions
Larry Loeb  
9/5/2017   3 comments
Not every security solution has a place in the IoT. Professionals must look in new directions to keep the Internet of Things secure.
Friday Haiku: I Authenticate, Therefore, I Am
Curt Franklin  
9/1/2017   6 comments
Are we more than our authentication factors?
New Malware Builder Makes Hacking Easier
Curt Franklin  
9/1/2017   4 comments
A free new builder for trojans makes it easier than ever to be a criminal hacker.
Has Facial Recognition's Time Arrived?
Simon Marshall  
9/1/2017   6 comments
Startup iProov says it has cracked the code on a reliable, secure facial recognition system.

Latest Articles
Cisco's research has proven that beyond meeting compliance requirements, good privacy is good for business and individuals.
Once again, a novel 'speculative execution side-channel' attack has been discovered by researchers.
Security researchers have found that the implementation in Remote Desktop Gateway of string segmentation lays it open to memory corruption vulnerabilities.
In Q4 of 2019, the average ransom payment increased by 104% to $84,116, finds Coveware report.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Information Resources
upcoming Webinars
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with