Security Experts:

More Security Headlines

Microsoft, Google and Mozilla will completely disable support for the RC4 cipher in their web browsers in early 2016.
Chrome 45 available for download. 29 security issues patched in the latest version.
ThreatQuotient launched ThreatQ, a threat intelligence platform designed to manage and correlate threat data from external sources with internal security and analytics solutions.
Study conducted by Google’s lcamtuf shows that most vulnerabilities are discovered by full-time researchers using fuzzers.
This webcast will show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.
New Trojan named “Shifu” targets the customers of 14 Japanese banks. Users in other countries targeted as well.
The new Webroot IoT Security Toolkit offers integrated protection against threats such as malware and zero-day exploits, as well as internal vulnerabilities.
A group of hackers claimed they had downed the website of Britain's lead law enforcement agency after it arrested six people over similar attacks.
Intel Security report explains how endpoint security products should be capable of detecting GPU malware.
KeyRaider iOS malware used to steal credentials for 225,000 Apple accounts. Stolen data used for malicious jailbreak tweaks.

SecurityWeek Experts

rss icon

Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Torsten George's picture
Organizations that address certain inhibitors to risk management head-on, can significantly reduce the time it takes to produce risk profiles.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Marc Solomon's picture
How do we handle the responsibility that cloud computing brings? It’s a responsibility that must be shared among vendors, users, business leaders, and IT security professionals and involves three key aspects.
Joshua Goldfarb's picture
The way in which we as a security community seem to be approaching the topic of information sharing seems backward to me.
Alan Cohen's picture
If vaults deep within the building protect banks from bank robbers, why do so many security professionals focus so much attention on their data center’s front door?
Rafal Los's picture
Security people who jump into troubled security organizations to help right the ship put their careers on the line and personal aspirations on hold, and their families take a temporary back seat.
Nate Kube's picture
Critical services we rely on are increasingly dependent upon cyberphysical interactivity. The scope of these critical services continues to broaden and deepen across industries, especially as the functionality and speed of devices is more widely understood.
Jason Polancich's picture
While most businesses feel they should be pursuing more robust cyber intelligence functions, most aren’t actually doing anything about it at all.