Security Experts:

More Security Headlines

Restaurant chain Chipotle informs customers that its payment processing systems have been hacked. Investigation ongoing [Read More]
Vulnerabilities in Hyundai remote access app allowed hackers to locate, unlock and start a targeted vehicle [Read More]
Critical command execution/privilege escalation vulnerability found in display software shipped with millions of devices [Read More]
New variants of a recently discovered BrickerBot Internet of Things (IoT) malware capable of permanently disabling devices were observed last week, Radware security researchers warn. [Read More]
Russia-linked cyberspy group Pawn Storm (aka APT28 and Fancy Bear) reportedly targeted French presidential candidate Emmanuel Macron [Read More]
An update released by Webroot caused the company’s antivirus to detect legitimate files as W32.Trojan.Gen [Read More]
Peter Yuryevich Levasho, the alleged author of the Kelihos botnet, has been charged in an eight-count indictment returned by a federal grand jury. [Read More]
Russian cybercriminal Valeryevich Seleznev was sentenced in the United States to 27 years in prison for hacking into point-of-sale (PoS) computers to steal credit card numbers. [Read More]
The Cyber Shield Act is a legislative proposal designed to cut "to the core of critical infrastructure cyber defense." It is proposed by Senator Edward J. Markey, Massachusetts -- but you won't find a draft bill anywhere yet. [Read More]
One of the tools allegedly used by the NSA-linked threat actor “Equation Group” and made public roughly a week ago has been already observed in live attacks. [Read More]

SecurityWeek Experts

rss icon

Travis Greene's picture
Having served aboard the USS Carl Vinson in the late 1990s, I can assure you that the World War II slogan, “loose lips sink ships” is still very much a part of Navy life.
Torsten George's picture
Unfortunately, a significant portion of information security resources are consumed by data gathering and aggregation processes.
Galina Antova's picture
The “red lines” that conventional wisdom once held would prevent disruptive or destructive attacks against critical infrastructure have now been crossed numerous times, and we can safely assume they will be again.
Avi Chesla's picture
At the end of the day, CISOs are finding it very challenging to be able to assess the performance of the security products in their organization’s arsenal.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Jennifer Blatnik's picture
While automation delivers many benefits to the enterprise, there are dangers to mindlessly automating every business function, especially when it comes to security.
Steven Grossman's picture
Without visibility into your information assets, their value, where they live, how they relate to each other and who has access to them, any strategy for protection would be inherently incomplete and ineffective.
Marie Hattar's picture
Full visibility is necessary when it comes to security, but some things should stay hidden. How do we see the whole network? What tools do we need? How do we stay compliant?
Scott Simkin's picture
Training employees to be aware of credential-based attacks and how to avoid them, as well as adopting the right prevention-based measures, can have a material impact on stopping a common and effective attack techniques.
Adam Meyer's picture
In the cyber threat intelligence space, there is confusion (much of which is driven by vendors)... where threat information is positioned as finished intelligence.