Sign up for our weekly newsletter!
Curt Franklin
Latest Content
<<   <   Page 2 / 2
Gartner Symposium Opens in Orlando
Curt Franklin  
10/2/2017   1 comment
Gartner Symposium ITXpo is opening today in Orlando. Security Now is there to bring you the latest from the analysts and consultants at one of the most influential firms in the IT industry.
Friday Haiku: The Quantum Future
Curt Franklin  
9/29/2017   3 comments
The Friday Haiku reflects on a week in Orlando's heat.
Authentication Tackles Forests at Microsoft Ignite
Curt Franklin  
9/29/2017   2 comments
Authentication is an issue on a personal computer. It's a complex problem in AD forest management.
Three Reasons Facial Recognition Will Win
Curt Franklin  
9/27/2017   40 comments
Facial recognition technology is coming to a device near you. Here are three reasons it's inevitable.
Microsoft Ignite: 9 Things to Know
Curt Franklin  
9/26/2017   1 comment
Microsoft's largest annual conference, Ignite, is underway in Orlando, Fla. Security Now is there – and here's what we're seeing.
Splunk Ups Machine IQ in Software Updates
Curt Franklin  
9/26/2017   1 comment
Splunk has increased machine intelligence and analytics capabilities in a series of software updates.
Microsoft's Nadella Shares the Future at Ignite
Curt Franklin  
9/25/2017   3 comments
Satya Nadella's keynote address can be boiled down to four phrases or words. Here's what you need to know to get ready for the Microsoft future.
Encryption: 6 Ways to Make It Matter
Curt Franklin  
9/25/2017   7 comments
A Security Now special report provides best practice notes for encryption in the enterprise.
Right & Wrong Lessons From the Equifax Breach
Curt Franklin  
9/22/2017   12 comments
There are lots of lessons to learn from the Equifax breach. Just make sure you're learning the right ones.
Friday Haiku: Gem or Not?
Curt Franklin  
9/22/2017   4 comments
How will CISOs respond to the pressure of recent breaches? The Friday haiku asks the question.
A New, Invisible Threat Jumps the Air Gap
Curt Franklin  
9/21/2017   4 comments
The infrared capabilities of security cameras provide a new way for attackers to reach systems that have no connection to the Internet.
CISOs Under Fire: New Poll Shows Progress & Peril
Curt Franklin  
9/20/2017   2 comments
A new report by F5 and Ponemon looks at the state of the CISO in modern enterprises.
Survey Finds Companies Don't Know Cloud Security
Curt Franklin  
9/20/2017   2 comments
Companies are worried about security in the public cloud, but a new survey shows they don't understand the basics.
Intent-Based Security Is New Path for Vendors
Curt Franklin  
9/19/2017   2 comments
A growing number of security and networking vendors are talking about intent-based security as a next-gen solution.
Protect DNS: A Conversation With Dave Dufour of Webroot
Curt Franklin  
9/15/2017   Post a comment
DNS is vulnerable and must be protected. An interview with Dave Dufour explains the vulnerabilities and some of the protection.
Friday Haiku: No Safety in Bluetooth
Curt Franklin  
9/15/2017   42 comments
Bluetooth's vulnerability might be the biggest security story of the year.
AWS Elasticsearch Servers Host Malware
Curt Franklin  
9/14/2017   Post a comment
Two strains of POS malware have been using Elasticsearch servers on AWS as hiding places.
BlueBorne Threatens 5 Billion Bluetooth Devices
Curt Franklin  
9/13/2017   1 comment
More than 5 billion devices are vulnerable to a set of eight Bluetooth flaws, even if they aren't in discoverable mode.
Equifax Breach Won't Be the Last or Worst
Curt Franklin  
9/13/2017   22 comments
The Equifax breach shows that a major change in personal records is required, according to a senior Gartner analyst.
Friday Haiku: A Cat 5 Credit Hack
Curt Franklin  
9/8/2017   5 comments
An Equifax hack is an ill wind for the credit world.
SANS Study Says Reputation Is a Cyber-Casualty
Curt Franklin  
9/7/2017   1 comment
The latest security study says that you've probably been attacked and your reputation has taken the biggest hit.
BroadSoft Error Exposes TWC PII on AWS S3
Curt Franklin  
9/6/2017   Post a comment
A mis-configured Amazon Web Storage (AWS) instance has once again exposed millions of private customer records to the public Internet. Is it time for companies to re-think the way they're building their AWS buckets?
Qadium Gets $40M Series B for Internet Visibility
Curt Franklin  
9/5/2017   1 comment
Qadium indexes every device on the public Internet, a technology that's attracted some big-time Silicon Valley investors.
Friday Haiku: I Authenticate, Therefore, I Am
Curt Franklin  
9/1/2017   6 comments
Are we more than our authentication factors?
New Malware Builder Makes Hacking Easier
Curt Franklin  
9/1/2017   4 comments
A free new builder for trojans makes it easier than ever to be a criminal hacker.
Millions of Email Addresses Exposed in Latest Malware Database
Curt Franklin  
8/30/2017   23 comments
A database housed in the Netherlands is found to contain hundreds of millions of hacked email addresses.
Automation Deserves Skepticism
Curt Franklin  
8/29/2017   15 comments
While automation might be the next great tech wave, let's take some time to consider it.
Black Hats Win: Results From the Latest Poll
Curt Franklin  
8/28/2017   16 comments
The hat you wear as a security researcher matters, say those who took the latest poll. And the most effective hat color is black.
DDoS Trends Show Big Impact From Fewer Servers
Curt Franklin  
8/25/2017   2 comments
A change in control networks means that this quarter saw DDoS attacks from fewer endpoints, each having a bigger impact.
Friday Haiku: Fear the Zombie Server
Curt Franklin  
8/25/2017   26 comments
DDoS attacks are lurking in armies of zombie servers.
DoJ Narrows Scope of DreamHost Warrant
Curt Franklin  
8/23/2017   Post a comment
The Department of Justice has scaled back the demands of a search warrant served to web hosting provider DreamHost.
Delaware Requires Data Security in New Law
Curt Franklin  
8/23/2017   10 comments
Delaware has become the latest state requiring companies to protect private data.
New SaaS Service Offers Order for Access
Curt Franklin  
8/22/2017   Post a comment
One Identity's new SaaS offering, Starling IARI, analyzes user access and roles to secure enterprise networks.
Voice of Security Radio: Building Secure Applications
Curt Franklin  
8/22/2017   2 comments
In too many companies, security vulnerabilities start at the application. Join us for this week's episode to hear how to make your applications more secure.
Amazon S3 Errors Hit Home Again
Curt Franklin  
8/21/2017   3 comments
Another S3 data release shows the critical importance of correctly configuring the cloud storage service.
Finding Tools for DevSecOps
Curt Franklin  
8/18/2017   Post a comment
Finding the right tools can be the start of the right path toward DevSecOps. Here's how to start the hunt.
Questions of Colors
Curt Franklin  
8/18/2017   2 comments
A Friday Haiku asks about the color of your hat.
Rackspace Strengthens Its Managed Security Story
Curt Franklin  
8/17/2017   1 comment
Rackspace is adding features and functions to its managed security offerings. Is it all a company needs?
Voice of Security Radio: Finding Flaws in the IoT
Curt Franklin  
8/15/2017   1 comment
Can we crowdsource our way to IoT security? Join editor Curt Franklin and Bugcrowd's Casey Ellis as they talk about the possibilities.
DevSecOps: Security in the Process
Curt Franklin  
8/15/2017   1 comment
Can building security into the process make everything more secure? Proponents of DevSecOps say 'Yes.'
Obscurity Hampers Security: The Latest Survey
Curt Franklin  
8/11/2017   2 comments
Lack of visibility is the number one obstacle to security, according to a new study released this week.
Friday Haiku: On the Path
Curt Franklin  
8/11/2017   3 comments
This week's Friday Haiku looks beyond agile.
Defining DevOps for the Enterprise
Curt Franklin  
8/9/2017   1 comment
Is there anything in the DevOps methodology that makes it impossible to use for secure development? To get the answer, first you have to define DevOps.
Voice of Security Radio: In the Name (Server) of Security
Curt Franklin  
8/8/2017   1 comment
Join Curt Franklin and his guest, Cricket Liu of Infoblox, as they talk about DNS's role in security.
HONEST Poll Results: When Should You Pay the Ransom?
Curt Franklin  
8/7/2017   3 comments
When ransomware hits, when should you just pay up? The Security Now community has spoken.
WannaCry Hero in FBI Custody
Curt Franklin  
8/7/2017   1 comment
Marcus Hutchins, the researcher who killed WannaCry, was arrested last week in Las Vegas. Should his arrest send a chill over the researcher community?
The Friday Haiku: Old-Fashioned Security
Curt Franklin  
8/4/2017   4 comments
A Friday InfoSec haiku.
Women in Information Security: Voice of Security Radio
Curt Franklin  
8/1/2017   5 comments
Join Curt Franklin as he talks with Kate Kuehn, head of security practice for BT Americas, about the role of the CISO and the possibilities in a more diverse workforce.
Five Words for Black Hat
Curt Franklin  
7/31/2017   11 comments
The Black Hat 2017 conference could be summed up in five words: Should there be more?
Mobile Worries for a Security Pro
Curt Franklin  
7/28/2017   5 comments
The most worrying security problem for one security pro is something that sits in the palm of your hand.
<<   <   Page 2 / 2

Latest Articles
Report found that DNS Amplification contributed to the largest share, compared to other methods, of attack activities in Q2 2019.
The threat of escalation attacks and forged administration levels has plagued Kerberos authentication systems for years. Data-analytics startup Qomplx claims to do the math that solves the problem.
Global network of honeypots measured more than triple the attack traffic of the previous period, to a total of over 2.9 billion events.
But to prepare for something usually means you have an idea about what you are preparing for, no?
An emerging and increasingly sophisticated threat campaign is employing obscure file formats.
Flash Poll
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with