Security Experts:

More Security Headlines

TunnelBear commissioned an audit of its VPN product and only few vulnerabilities were found in recent versions [Read More]
Drupal 8 security update patches access bypass vulnerabilities in views, REST API, and entity access system [Read More]
Palo Alto Networks managed to uncover the infrastructure behind recent attacks that leveraged the Chthonic and Nymaim Trojans. [Read More]
An increase in Chinese websites offering online distributed denial of service (DDoS) tools was observed after a localized version of the source code of online booters was put up for sale, Talos reveals. [Read More]
Gartner predicts that worldwide information security spending will reach $86.4 billion in 2017 and increase to $93 billion in 2018. [Read More]
A new DDoS attack method dubbed “pulse wave” is particularly effective against “appliance first, cloud second” hybrid defenses [Read More]
More than 4.7 million users could be exposed to potentially malicious ads and credential theft after cybercriminals managed to hijack the developer accounts of several popular Chrome extensions. [Read More]
Respond Software emerges from stealth with product that automates the decision-making of a SOC analyst and $12 million in funding [Read More]
Researchers have discovered that the Cerber ransomware now includes a new feature to avoid encrypting canary files and triggering anti-ransomware programs. [Read More]
Amazon launches Macie, a new service that helps AWS users discover, classify and protect sensitive data [Read More]

SecurityWeek Experts

rss icon

Alastair Paterson's picture
The emergence of decentralized marketplaces within the criminal ecosystem poses significant challenges for law enforcement agencies and private security vendors.
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Preston Hogue's picture
Business leaders have become much more sophisticated in understanding IT, and they need bring that same level of sophistication to security.
Travis Greene's picture
Automation will play an ever-increasing role in IT security. Like all automation, it will result in greater productivity that will reduce the need for certain staff, but increase the need for others.
Galina Antova's picture
In the ICS world, we clearly don’t have a decade to evolve through the same layered/defense-in-depth strategies that marked the last decade in IT security.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?
Ashley Arbuckle's picture
As with most new and challenging endeavors, you need to define a pragmatic approach to mastering hyper-connectivity, data integration, and machine learning.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.