Security Experts:

More Security Headlines

Philip D. Quade, Chief of the NSA Cyber Task Force and Special Assistant to the Director National Security Agency for Cyber, will deliver a keynote address at the 2015 ICS Cyber Security Conference, taking place Oct. 26-29 in Atlanta, Georgia.
Researcher Patrick Wardle has found a way to easily bypass Apple’s Gatekeeper security feature.
An analysis of the vulnerabilities discovered in the systems of organizations in various industries provides some insight on the most common types of flaws and the time it takes to address them.
Oleg Petrovsky of HP Security Research has detailed some of the methods that can be used to hack and hijack unmanned aerial vehicles (UAVs), better known as drones.
The United States withdrew several CIA officers from its embassy in Beijing to protect them from being uncovered through a hack of US federal employee records, The Washington Post has reported.
Cisco has agreed to acquire privately held, UK-based Portcullis, a consultancy that provides cybersecurity services to enterprise and government sector clients.
Former US intelligence contractor and whistleblower Edward Snowden joined Twitter Tuesday, picking up more than a quarter of a million followers on the social network in just over two hours.
Microsoft on published new details on the user data collection in Windows 10, in an attempt to put controversy on the matter to rest.
Akamai said a botnet using the XOR DDoS Trojan is now capable of launching 150+ gigabit-per-second (Gbps) DDoS attacks.
Raytheon has been awarded a new cybersecurity contract with the Department of Homeland Security (DHS) that could be worth approximately $1 billion.

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Let’s face it. Most people in the world in which we live are not very security literate. To learn security lessons from the “unwashed masses”, we must first understand what security means to them.
Rafal Los's picture
It’s your job to understand your limitations on the understanding of risk and to responsibly formulate defensible calculations that drive your tactics and strategy. Using “probability” as a metric is not only black magic, but it’s going to give you the wrong answer.
Travis Greene's picture
The true value of identity is not in creating more defense in depth, which means that identity is not the new perimeter.
Wade Williamson's picture
For CISOs and security directors, recruiting and retaining talent for their security teams is more challenging than keeping pace with technology.
Jason Polancich's picture
Even some of the most “well-to-do” of companies often skimp on cyber defense or simply don’t prioritize it sufficiently.
David Holmes's picture
If LE succeeds, it might influence the rest of the CA industry to get its act together. It might drive many of the slightly sketchy bargain CA companies out of the market.
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.
Marc Solomon's picture
The global cybersecurity skills shortage isn’t going away any time soon. But by attacking it on multiple fronts we can proactively work to address it
Eduard Kovacs's picture
US intel chief warns that Russian hackers have been targeting critical infrastructure ICS. Security experts say the threat is real.
Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.