Security Experts:

More Security Headlines

Windows 10 will include new information and identity protection mechanisms designed to address modern security threats.
The number of DNS amplification attacks grew by 183 percent between January and August, according to a new report from Symantec.
The Federal Trade Commission (FTC), the agency whose goal is to protect America's consumers, has appointed Ashkan Soltani as chief technologist.
Researchers at Trend Micro analyze a cyber-espionage campaign that has targeted military, government and media organizations.
A new piece of malware discovered by researchers at Trend Micro is designed to steal files from infected systems and upload them to the file storage and synchronization service Google Drive.
Microsoft has become aware of targeted cyberattacks leveraging a new vulnerability (CVE-2014-6352) that affects most supported Windows releases.
Apple CEO Tim Cook met a senior Chinese official Wednesday, days after hackers targeted the company's iCloud service in an attack which an anti-censorship group claims originated in China.
Google launched "Security Key", a physical USB second factor that's designed to provide an extra layer of protection to user accounts.
Iranian security services have arrested several "spies" in Bushehr province, where the country's sole nuclear plant is based, Intelligence Minister Mahmoud Alavi announced Sept.21.
Apple said Tuesday its iCloud server has been the target of "intermittent" attacks, hours after a security blog said Chinese authorities had been trying to hack into the system.

SecurityWeek Experts

rss icon

Travis Greene's picture
IAM is sometimes forgotten in the discussion of controls. However, it’s best to have these conversations when planning and evaluating controls, rather than after a breach.
James McFarlin's picture
A bountiful source of innovative new products for mature security providers lies in the hunting ground of promising newer firms.
Adam Firestone's picture
The imposition of externally-defined cybersecurity methodologies and solutions on both government and critical infrastructure programs hasn’t proven effective. Fortunately, the political and technical winds are shifting
Torsten George's picture
To limit the risk of having drive-by malware attacks planted on their websites, organizations should monitor the payload of their different Internet properties, which for larger organizations can easily become a huge undertaking.
Joshua Goldfarb's picture
As information security professionals, it is tempting to become enamored with the beauty or elegance of a technical solution, analytical technique, or investigative outcome.
Scott Simkin's picture
The network edge is the ideal location for quickly preventing the vast majority of attacks, but looking forward, you should consider how pervasive deployments can stop the new breed of advanced attack.
James McFarlin's picture
Very little will get a board of directors’ attention as quickly as a cyber data breach with its attendant risks of damage to market capitalization, competitive advantage and brand reputation.
Marc Solomon's picture
Advancing our security controls isn’t going to happen overnight. But we are well on our way with technology and capabilities that are already headed in this direction, implementing dynamic controls to see more, learn more, and adapt quickly.
Rebecca Lawson's picture
There is a widening gap between detection of a threat and enforcement that causes the threat to stop at the firewall, rather than play out its malicious intent.
Mark Hatton's picture
Software and hardware alone are not enough to manage a massive enterprise security program. You need security professionals and experienced leaders who can keep the team (and the tools) operating effectively.