Security Experts:

More Security Headlines

LastPass quickly fixed a vulnerability in the Firefox add-on that could have been exploited to steal passwords [Read More]
PhishMe, a company that helps organizations teach security awareness by educating employees on how to identify phishing attacks, today announced it has raised a whopping $42.5 million in funding. [Read More]
The popular and dangerous Locky ransomware has upgraded its distribution mechanism and is now spread embedded in JavaScript files attached to spam emails. [Read More]
Ransomware-as-a-Service (RaaS) has become a very popular business model over the past several months, and the actor(s) behind Petya and Mischa ransomware families have adopted the service model. [Read More]
Cybercriminals are abusing stolen or newly created PayPal accounts to send spam emails that link to the Chthonic banking Trojan, Proofpoint researchers warn. [Read More]
Presidential Policy Directive (PPD-41) sets forth principles governing the Federal Government’s response to any cyber incident, whether involving government or private sector entities. [Read More]
Attend this webinar to learn the 5 key steps to building a hybrid architecture in AWS using the VM-Series next-generation firewall. [Read More]
Siemens and Rockwell Automation release software updates to patch vulnerabilities in several products [Read More]
BlackBerry is calling the DTEK50 'the world's most secure Android Smartphone'. It comes with Android Marshmallow 6.0 underwritten by BlackBerry's security experience. [Read More]
Kimpton Hotels & Restaurants investigating possible payment card breach following reports of unauthorized charges [Read More]

SecurityWeek Experts

rss icon

Ashley Arbuckle's picture
How can security professionals harness cybersecurity to help their organizations take advantage of new opportunities in order to thrive in this digital era?
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.
Wade Williamson's picture
It turned out to be a tricky month for security admins to take that long-awaited summer vacation because July was one of the busiest months in recent memory in terms of vulnerabilities.
Jim Ivers's picture
If a car’s systems can be hacked to disable critical systems, then attacks can also be used to extract information. Similar to IoT, if data is being collected, data can be exfiltrated.
Travis Greene's picture
Republicans and Democrats admit that the U.S. government should be doing more to reduce the burden of securing digital business. Perhaps the next president, regardless of which party wins, can find a way to make progress on these wish list items.
Adam Meyer's picture
Threat intelligence is all about reducing uncertainty. A threat intelligence plan should help you define why you are doing what you are doing from an intelligence perspective.
Alastair Paterson's picture
It's important to look at your environment through the eyes of an attacker to detect the threats and vulnerabilities relevant to your organization.
Torsten George's picture
Vulnerability assessments are often confused with penetration tests. In fact, the two terms are often used interchangeably, but they are worlds apart.
Joshua Goldfarb's picture
You’ll never see someone who solved their alert fatigue issues and runs an efficient security operations program on the six o’clock news. Hacking is sexy, but defending is an important piece of the security puzzle.