Security Experts:

More Security Headlines

Google said it would offer stronger online security for "high risk" users who may be frequent targets of online attacks. [Read More]
Technology companies worldwide have released or are working on releasing patches to address the dangerous Wi-Fi vulnerabilities publicly disclosed on Monday. [Read More]
Taiwan bank heist that resulted in the theft of $60 million has been linked to the North Korean hacker group known as Lazarus [Read More]
BlackBerry patches two vulnerabilities, including code execution flaw, in Workspaces Server [Read More]
DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]
A newly discovered flaw in the widely used Wi-Fi encryption protocol could leave millions of users vulnerable to attacks. [Read More]
Security consulting firm AsTech has announced a $1 million guarantee for its Qualys Managed Services offering. [Read More]
I recent attack reminds us that DMARC can prevent phishing from genuine domains, but cannot prevent phishing from lookalike domains. [Read More]
A Middle Eastern threat group has been using a Flash Player zero-day vulnerability to deliver FinFisher spyware [Read More]
Dangerous vulnerabilities in the Wi-Fi standard render all Wi-Fi Protected Access II (WPA2) protocol traffic to snooping. [Read More]

SecurityWeek Experts

rss icon

Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
Marie Hattar's picture
Moving applications and content out to the edge of the network in cellular base stations is making some CSOs at large enterprises nervous.
Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Marc Solomon's picture
How do you determine the amount and mix of data that’s “just right” for your organization? To answer this question it helps to understand what’s driving the need for data in the first place.
Preston Hogue's picture
As security professionals, it’s on us to understand the business implications of those conveniences and the impact they may have.
Joshua Goldfarb's picture
A seat at the security table should not be for only the elite and largest of businesses or security vendors. The time has come to democratize security.
Jennifer Blatnik's picture
You can slow down a hacker, but it will do you good to accept that you may never be able to truly stop someone from getting through your first line of defense.
David Holmes's picture
Manufacturers are currently experimenting with several possible methods to avoid default passwords, and your IoT project must consider the default password problem to be among the highest priority.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Josh Lefkowitz's picture
Business Risk Intelligence (BRI) can help inform their decisions, gain a decision advantage over adversaries, and mitigate a broad spectrum of cyber and physical risks.