Security Experts:

More Security Headlines

Organizations reminded that ICANN will soon change the root zone key signing key (KSK) for the DNSSEC protocol [Read More]
OurMine hackers take control of PlayStation Facebook and Twitter accounts, and claim to have obtained PlayStation Network databases [Read More]
Elon Musk and over 100 robotics and AI entrepreneurs demand global ban on killer robots [Read More]
High severity remote code execution vulnerability found in Windows versions of Unity Editor. Game engine developers release patches [Read More]
A piece of code linked to both the UK researcher Marcus Hutchins (aka MalwareTech) and the Kronos malware was first published in 2009 [Read More]
CLKscrew - design flaws in energy management systems expose devices to remote attacks [Read More]
Russia-linked Turla cyberspies use new dropper to deliver JavaScript backdoor in attacks aimed at entities interested in G20 [Read More]
A Canadian man accused of carrying out devastating cyberattacks on Yahoo waived his right to an extradition hearing on Friday and will soon be handed over to US marshals. [Read More]
What appears to be the decryption key for Apple's Secure Enclave Processor (SEP) firmware was posted online by a hacker going by the name of xerub. [Read More]
President Donald Trump ordered the US military on to elevate its cyber warfare operations to a separate command, signaling a new strategic emphasis on electronic and online offensive and defensive operations. [Read More]

SecurityWeek Experts

rss icon

Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Rafal Los's picture
Optiv's Rafal Los shares some advice on how to build and cultivate relationships in infosec
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Adam Meyer's picture
When thinking about threat intelligence, before you buy a data feed, platform, service, etc. you should have a defined process in place that supports a defined strategy.
Alastair Paterson's picture
The emergence of decentralized marketplaces within the criminal ecosystem poses significant challenges for law enforcement agencies and private security vendors.
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Preston Hogue's picture
Business leaders have become much more sophisticated in understanding IT, and they need bring that same level of sophistication to security.
Travis Greene's picture
Automation will play an ever-increasing role in IT security. Like all automation, it will result in greater productivity that will reduce the need for certain staff, but increase the need for others.
Galina Antova's picture
In the ICS world, we clearly don’t have a decade to evolve through the same layered/defense-in-depth strategies that marked the last decade in IT security.
Erin O’Malley's picture
Can you see into all data across your network? Or does some data remain hidden due to silos between network and security operations teams?