Curt Franklin
Content posted in September 2017
Friday Haiku: The Quantum Future
Curt Franklin  
9/29/2017   3 comments
The Friday Haiku reflects on a week in Orlando's heat.
Authentication Tackles Forests at Microsoft Ignite
Curt Franklin  
9/29/2017   2 comments
Authentication is an issue on a personal computer. It's a complex problem in AD forest management.
Three Reasons Facial Recognition Will Win
Curt Franklin  
9/27/2017   40 comments
Facial recognition technology is coming to a device near you. Here are three reasons it's inevitable.
Microsoft Ignite: 9 Things to Know
Curt Franklin  
9/26/2017   1 comment
Microsoft's largest annual conference, Ignite, is underway in Orlando, Fla. Security Now is there – and here's what we're seeing.
Splunk Ups Machine IQ in Software Updates
Curt Franklin  
9/26/2017   1 comment
Splunk has increased machine intelligence and analytics capabilities in a series of software updates.
Microsoft's Nadella Shares the Future at Ignite
Curt Franklin  
9/25/2017   3 comments
Satya Nadella's keynote address can be boiled down to four phrases or words. Here's what you need to know to get ready for the Microsoft future.
Encryption: 6 Ways to Make It Matter
Curt Franklin  
9/25/2017   7 comments
A Security Now special report provides best practice notes for encryption in the enterprise.
Right & Wrong Lessons From the Equifax Breach
Curt Franklin  
9/22/2017   12 comments
There are lots of lessons to learn from the Equifax breach. Just make sure you're learning the right ones.
Friday Haiku: Gem or Not?
Curt Franklin  
9/22/2017   4 comments
How will CISOs respond to the pressure of recent breaches? The Friday haiku asks the question.
A New, Invisible Threat Jumps the Air Gap
Curt Franklin  
9/21/2017   4 comments
The infrared capabilities of security cameras provide a new way for attackers to reach systems that have no connection to the Internet.
CISOs Under Fire: New Poll Shows Progress & Peril
Curt Franklin  
9/20/2017   2 comments
A new report by F5 and Ponemon looks at the state of the CISO in modern enterprises.
Survey Finds Companies Don't Know Cloud Security
Curt Franklin  
9/20/2017   2 comments
Companies are worried about security in the public cloud, but a new survey shows they don't understand the basics.
Intent-Based Security Is New Path for Vendors
Curt Franklin  
9/19/2017   2 comments
A growing number of security and networking vendors are talking about intent-based security as a next-gen solution.
Protect DNS: A Conversation With Dave Dufour of Webroot
Curt Franklin  
9/15/2017   Post a comment
DNS is vulnerable and must be protected. An interview with Dave Dufour explains the vulnerabilities and some of the protection.
Friday Haiku: No Safety in Bluetooth
Curt Franklin  
9/15/2017   42 comments
Bluetooth's vulnerability might be the biggest security story of the year.
AWS Elasticsearch Servers Host Malware
Curt Franklin  
9/14/2017   Post a comment
Two strains of POS malware have been using Elasticsearch servers on AWS as hiding places.
BlueBorne Threatens 5 Billion Bluetooth Devices
Curt Franklin  
9/13/2017   1 comment
More than 5 billion devices are vulnerable to a set of eight Bluetooth flaws, even if they aren't in discoverable mode.
Equifax Breach Won't Be the Last or Worst
Curt Franklin  
9/13/2017   22 comments
The Equifax breach shows that a major change in personal records is required, according to a senior Gartner analyst.
Friday Haiku: A Cat 5 Credit Hack
Curt Franklin  
9/8/2017   5 comments
An Equifax hack is an ill wind for the credit world.
SANS Study Says Reputation Is a Cyber-Casualty
Curt Franklin  
9/7/2017   1 comment
The latest security study says that you've probably been attacked and your reputation has taken the biggest hit.
BroadSoft Error Exposes TWC PII on AWS S3
Curt Franklin  
9/6/2017   Post a comment
A mis-configured Amazon Web Storage (AWS) instance has once again exposed millions of private customer records to the public Internet. Is it time for companies to re-think the way they're building their AWS buckets?
Qadium Gets $40M Series B for Internet Visibility
Curt Franklin  
9/5/2017   1 comment
Qadium indexes every device on the public Internet, a technology that's attracted some big-time Silicon Valley investors.
Friday Haiku: I Authenticate, Therefore, I Am
Curt Franklin  
9/1/2017   6 comments
Are we more than our authentication factors?
New Malware Builder Makes Hacking Easier
Curt Franklin  
9/1/2017   4 comments
A free new builder for trojans makes it easier than ever to be a criminal hacker.

Latest Articles
Cisco's research has proven that beyond meeting compliance requirements, good privacy is good for business and individuals.
Once again, a novel 'speculative execution side-channel' attack has been discovered by researchers.
Security researchers have found that the implementation in Remote Desktop Gateway of string segmentation lays it open to memory corruption vulnerabilities.
In Q4 of 2019, the average ransom payment increased by 104% to $84,116, finds Coveware report.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Information Resources
upcoming Webinars
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
Podcast archive
Flash Poll
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2020 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with