Security Experts:

More Security Headlines

Researchers demo aIR-Jumper, a malware that uses infrared (IR) cameras to open a two-way communication channel to air-gapped networks [Read More]
Threat Stack, a Boston based intrusion detection startup, has raised $45 million in a Series C funding, bringing the total raised by the company to more than $70 million. [Read More]
Apple this week announced the availability of 8 security patches for its iPhone 5s and later, iPad Air and later, and iPod touch 6th generation users, released as part of the iOS 11 platform upgrade. [Read More]
Twitter has suspended a total of 935,897 accounts for the promotion of terrorism between August 1, 2015, and June 30, 2017, the company says in its latest transparency report. [Read More]
Optionsbleed - Apache leaks server memory via the “Allow” header in response to HTTP OPTIONS requests [Read More]
The recent Equifax breach affects roughly 100,000 Canadian consumers, but the company’s Canada systems are not impacted [Read More]
Tens of millions of Android users potentially had their information collected by a security application distributed through Google Play, Check Point security researchers warn. [Read More]
The European Union unveiled plans to setup a new intelligence-sharing agency, cyber war games and product safety labels. [Read More]
Siemens and PAS announce strategic partnership to provide cybersecurity solutions for industrial control systems (ICS) [Read More]
A recently discovered Android banking Trojan features a bot and command and control panel fully written from scratch, SfyLabs has discovered. [Read More]

SecurityWeek Experts

rss icon

Jennifer Blatnik's picture
If the rest of the community would give hackers more of a chance before writing them off as evildoers, there would potentially be more incentives for capable people to go into the white hat hacking business.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Markus Jakobsson's picture
While 2FA is a big step above and beyond the use of traditional passwords, it is not infallible, and thinking so makes the risk of failure even greater.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Joshua Goldfarb's picture
Benchmarking is about understanding how people use a variety of different products and services, what challenges they use them to address, and how those products and services fit into the organization’s security strategy.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Rafal Los's picture
Rather than starting with a sound, business-aligned strategy supported by business-executive stakeholders there are far too many security organizations that just choose the “do something” path.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.