Security Experts:

More Security Headlines

Secure email services provider ProtonMail introduces new encrypted contacts manager to help users protect their address book [Read More]
Meg Whitman, one of the most prominent women in Silicon Valley and a onetime candidate for California governor, announced Tuesday she was stepping down as chief executive of Hewlett Packard Enterprise. [Read More]
More vendors warn customers that their industrial communications products are vulnerable to the recently disclosed KRACK Wi-Fi attack [Read More]
Uber said that hackers accessed the personal data of 57 million of its users in a breach that had been covered up by the company for more than a year. [Read More]
Symantec has released an update to address a high severity directory traversal vulnerability in the Symantec Management Console. [Read More]
The chairpersons of the House Science, Space, and Technology Committee and the House Oversight and Government Reform Committee on Monday sent a new letter (PDF) to Paulino Barros, the interim CEO of Equifax. [Read More]
HP has promised to release patches for vulnerabilities found by researchers in some of the company’s printers [Read More]
A newly observed variant of the macOS-targeting Proton malware is spreading through a blog spoofing that of legitimate security company Symantec. [Read More]
When UK newspaper The Times ran a headline, 'Everyone has been hacked, say police', it leaves the question, is this just more scaremongering or a true reflection on the state of security? [Read More]
The notorious Cobalt hackers are now targeting banks themselves, instead of bank customers, according to Trend Micro. [Read More]

SecurityWeek Experts

rss icon

Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Ashley Arbuckle's picture
Here are five recommendations that can help you, as an IT security professional, proactively work in partnership with your OT counterparts to protect the business better.
Joshua Goldfarb's picture
Security teams have given up on building their workflow around a small number of “silver bullets” that claim to solve most of their problems
Preston Hogue's picture
Working closely with business groups throughout the process of due diligence fulfills the CISO’s responsibilities and creates a more security-savvy business.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Josh Lefkowitz's picture
It’s crucial to recognize that 2018 will very likely be yet another year of increasingly complex and damaging threats and incidents, which is why we must always build upon and further enhance our intelligence strategies.
Adam Meyer's picture
If your threat intelligence isn’t practical, it’s not really useful. Here are a few examples of practical questions you can ask your threat analyst team.
Travis Greene's picture
The cybersecurity community needs to identify where untapped resources exist in order to move beyond traditional industry practices and contend with this imbalance.
Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.