Profile for Curt Franklin
Member Since: May 24, 2017
Curtis Franklin, Jr. is editor of Light Reading's Security Now. He is also Light Reading's editor for security and similarly spooky, scary topics. Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has contributed to a number of technology-industry publications including Dark Reading, InformationWeek, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, HowStuffWorks, and ITWorld.com on subjects ranging from enterprise security to mobile enterprise computing and how insecticides actually kill things. Curtis is the author of hundreds of articles, the co-author of three books (including Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center), and has been a frequent speaker at computer and networking industry conferences across North America and Europe. A new book on cloud security, sure to be a best-seller, is currently in the works. When not writing, Curtis is a painter, photographer, cook and multi-instrumental musician. He is active in amateur radio (KG4GWA), running, hiking, stand-up paddleboarding, and is a certified Florida Master Naturalist.
In a pair of papers released over the last week, researchers have shown how two different types of attacks, Throwhammer and Nethhammer, can cause a bit flip in chips by sending packets across a standard network.
This week marked the one-year anniversary of the WannaCry ransomware attacks and its impact can still be seen in the form of such encrypting malware as NotPetya, BadRabbit and Olympic Destroyer.
Talk about overreacting. After researchers claimed to have found some flaws in PGP, the industry lost its collective mind. Here's what is really happening.
They may be stupidly named but they are essential for protecting enterprise assets that span on-premises servers, IaaS and PaaS clouds, as well as virtual machines.
The proposal from two security researchers at the University of North Carolina would entail creating a protocol that would enable websites and service providers to block attempts by individuals trying to use the same password for multiple sites.
ARCHIVED | August 31, 2017, 3pm EDT
An interview with Steve Grobman, CTO of McAfee
Tweets by Security_Now_
like us on facebook