Security Experts:

More Security Headlines

WikiLeaks published thousands of documents on Thursday from last year's Sony hacking scandal, calling them an insight into the inner workings of a "secretive" firm.
PCI DSS v3.1 is now out, and businesses have until the end of June 2016 to comply with the new rules regarding SSL and migrate off the protocol.
Iran poses a growing threat to America's computer networks and has launched increasingly sophisticated digital attacks and spying on US targets, according to a new report released Thursday.
Operation Pawn Storm continues to evolve its tactics to infect organizations all over the world.
Researcher calls out D-Link over failed router patches. The network device manufacturer has promised to release proper updates.
Serious vulnerability in a deprecated component of Cisco Secure Desktop can be exploited by a remote attacker for arbitrary command execution.
The IBM X-Force Exchange allows enterprise security teams and researchers to collaborate on security incidents and sift through troves of cyber threat intelligence data.
Experts in fields such as intelligence, APT, sophisticated malware, cyber warfare, and politics will take the stage at Suits and Spooks London 2015.
YouTube vulnerability allowed users to copy any comment to their own video or channel. Google patched the bug and rewarded the researchers who found it.
Dropbox introduces bug bounty program. The company is also rewarding researchers who reported serious vulnerabilities before the launch of the program.

SecurityWeek Experts

rss icon

Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
David Holmes's picture
Will containers replace traditional operating system virtualization in the same way that virtualization has replaced much of the physical, bare-metal world? And how secure are containers, anyway?
Joshua Goldfarb's picture
Tree rings occur when the growing season ends and growth stops. To avoid stagnation, a security organization must never stop growing.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Pat Calhoun's picture
While individual products and technologies are important weapons, they operate in a silo and lose sight of the bigger picture. The reality is that you can’t just rely on a single defense or a silver bullet.
Torsten George's picture
These four cyber security building blocks can help organizations can fulfill their requirements for quantitative risk reporting and neutralize the impact of cyber-attacks.
Rafal Los's picture
Enterprises that don’t operationalize configuration and asset management are doomed to repeat the cycle of lost productivity, frustration and panic.
Jason Polancich's picture
We seem to be at a watershed moment in both the cybersecurity market and with our business cyber defense circumstances.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Travis Greene's picture
Just like fumbles and interceptions derail a playbook plan, there are two ways that access certifications today are insufficient.