Security Experts:

More Security Headlines

Google hands over Gmail end-to-end encryption app E2EMail to the community [Read More]
Recently disclosed SHA-1 collision attack has a serious effect on repositories using Apache Subversion (SVN) system [Read More]
Google discloses unpatched vulnerability affecting Microsoft’s Edge and Internet Explorer web browsers [Read More]
A recently observed targeted malware campaign against South Korean users was using Hangul Word Processor (HWP) documents as the infection vector, Talos researchers reveal. [Read More]
Thousands of MySQL databases are potential victims to a ransom attack that appears to be an evolution of the MongoDB ransack attack earlier this year. [Read More]
The U.S. oil and gas industry is not prepared to address OT cybersecurity risks, according to a Siemens study [Read More]
A British national has been arrested at a London airport on suspicion of staging a cyber attack on Deutsche Telekom last year that knocked around a million German households offline, officials in both countries said. [Read More]
D-Link patches serious authentication bypass vulnerabilities in its DGS-1510 stackable managed switches [Read More]
Google researcher discovered that CloudFlare had been leaking sensitive customer data, including passwords and encryption keys [Read More]
Filecoder is a newly discovered ransomware targeting macOS that destroys encryption keys before sending them to its apparently inexperienced developer. [Read More]

SecurityWeek Experts

rss icon

Steven Grossman's picture
When it comes to security and cyber risk, CISOs are in the middle of it all, but they are not alone in protecting the enterprise.
Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Ashley Arbuckle's picture
Generally referred to as the “attack chain,” the approach cybercriminals follow to launch and execute attacks is well-documented and includes reconnaissance, weaponization, delivery, and installation.
Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.
Jim Ivers's picture
Enabling developers through the right mix of tools and education just makes too much sense and generates too much value for all concerned.
Joshua Goldfarb's picture
Let’s take a look at the essential functions required to bring a mature security operations and incident response capability to the masses via a unified security operations platform.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Josh Lefkowitz's picture
It’s critical to recognize that there will always be virtual ways in which terrorists and other criminals can create threats that no border process or physical security program can stop.