Security Experts:

More Security Headlines

Peter “Pierre” Romar, the 36-year-old Syrian Electronic Army member arrested in Germany, pleads guilty to hacking and extortion [Read More]
Security researchers have discovered numerous unpatched security vulnerabilities in the D-Link DWR-932B LTE router / access point, including backdoor accounts and default Wi-Fi Protected Setup (WPS) PIN. [Read More]
Two Russia-linked threat groups target citizen journalists investigating Russia’s involvement in the downing of flight MH17 [Read More]
Apple can’t tap into iMessage conversations, thanks to end-to-end encryption, but the iPhone maker does know who you message or attempt to message with. [Read More]
Researchers find links between the 2014 Yahoo hack and the alleged breach of 2012. The claim that 200 million accounts were stolen in 2012 is false [Read More]
The RIG exploit kit (EK) might be moving up the social ladder to become the top threat in its segment and leave Neutrino behind, recently observed malvertising campaigns suggest. [Read More]
Siemens releases firmware update for its SCALANCE industrial routers and firewalls to patch a vulnerability that could expose session cookies [Read More]
Dispel has launched what it calls 'the first commercially available counter-reconnaissance voice and video system' that 'renders live-stream communications impenetrable to metadata-driven surveillance and hacking.' [Read More]
Facebook releases Windows version of osquery, a tool that allows security teams to quickly detect and investigate threats [Read More]
A Norwegian court dismissed a bid by fugitive whistleblower Edward Snowden to win assurances he would not be extradited to the US should he come to Norway to collect an award. [Read More]

SecurityWeek Experts

rss icon

Ashley Arbuckle's picture
But by asking these key questions you can understand what’s required to proactively detect and respond to today’s malicious and complex attacks.
David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.
Rafal Los's picture
How do you win when you don’t know the rules? Adaptation is key. Even if you don’t know the rules, you know the game.
Ken McAlpine's picture
Perhaps it’s time to look at Open Security as the next necessary iteration of deploying security technology.
Jim Ivers's picture
When will automakers speak up about the measures they have taken to test the software embedded in their vehicles?
Barak Perelman's picture
Securing ICS networks is an extremely challenging task, as they lack many of the threat monitoring, detection, and response capabilities commonly found in IT infrastructures.
Dan Cornell's picture
Security teams and DevOps teams aren’t always on the same page and the lack of communication often results in misaligned priorities that significantly inhibit productivity.
Joshua Goldfarb's picture
Everyone loves a pretty picture or a slick graph, but very rarely do these supposed visualizations add any real value to security operations.
Wade Williamson's picture
A data center will often encounter an attacker at a far more mature phase of attack than the perimeter will, and likewise, will experience different types of threats and attack techniques.
Adam Meyer's picture
Cyber threat intelligence isn’t just another tool or layer of protection for your organization. It’s a capability that drives more effective cybersecurity decisions and more investment.