Security Experts:

More Security Headlines

Numerous websites are at risk after researchers discovered a critical vulnerability in the ImageMagick image processing suite [Read More]
The Qatar National Bank (QNB) may not be the only bank hacked by Turkish far-right group Bozkurtlar, according to Kaspersky Lab. [Read More]
In this podcast, Mike Hanley, Director of Duo Labs at Duo Security, talks about the state of security in the healthcare sector and why hospitals are such a prime target for ransomware attacks. [Read More]
OpenSSL has patched several vulnerabilities and informed users of a couple of non-security bugs that lead to an exploitable memory corruption [Read More]
By February 2017, Microsoft warned that both Microsoft Edge and Internet Explorer will block SHA-1 signed TLS certificates. [Read More]
The Board of Water and Light (BWL) in Lansing, Michigan, was struck by ransomware on Monday, April 25. [Read More]
Security flaws found by researchers in Samsung’s SmartThings apps can expose smart homes to hacker attacks [Read More]
Online registration for SecurityWeek's 2016 Industrial Control Systems (ICS) Cyber Security Conference is now open. [Read More]
Nikita Kuzmin, the creator of the Gozi malware, has been sentenced to time served and ordered to pay $7 million [Read More]
Google patches 40 Android vulnerabilities, including issues rated critical and high severity, with May 2016 update [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Before we can understand the purpose of analysis within the greater incident response process, we need to better understand the decision-making process.
Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Avi Chesla's picture
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
Jim Ivers's picture
Developers are not trained in security and security is not yet an adequately integrated component of the development process. We are not applying good, or even minimal, security practices.
Scott Simkin's picture
Threat intelligence is only valuable if an organization takes the necessary steps to quickly and easily apply that intelligence to actual security policy.
Shlomo Kramer's picture
When it comes to deciding why you should re-evaluate security vendors, the solution’s roadmap is of strategic importance because it may require technical analysis and rethinking of the overall network security architecture.
Emily Ratliff's picture
Writing yet another “security” paper isn’t going to do the trick. Security practitioners need to do a better job of getting our messages integrated into core developer documentation.
Adam Meyer's picture
Gaining awareness of supply chain risks and addressing them in the context of broader risk management programs will put organizations in a much better position when it comes to managing their cyber risk.
Alan Cohen's picture
By utilizing security technologies that are “invisible” to the infrastructure, you can reduce, rather than add to, IT and security’s burdens.