Security Experts:

More Security Headlines

C-level executives are by far at the greatest risk of being hacked outside of the office, according to a new report. [Read More]
Flashpoint Intelligence Platform 3.0 aims to convert and present the raw intelligence gleaned from the deep and dark web as actionable business risk intelligence. [Read More]
White hat hackers show how easy it is to bypass the iris recognition system on Samsung’s Galaxy S8 smartphones [Read More]
It takes SCADA vendors 150 days to patch vulnerabilities, and the industry is roughly at the same level as the cybersecurity sector [Read More]
The North Korea-linked Lazarus hacking group is "highly likely" to be responsible for the global "WannaCry" ransomware attacks, Symantec says. [Read More]
Russian authorities dismantle cybercrime gang responsible for infecting 1 million Android phones with a banking Trojan and stealing nearly $900,000 [Read More]
ImageMagick, an open source command line graphics file editor, has been retired by one of its major consumers: Yahoo. [Read More]
Several critical DoS vulnerabilities patched in Asterisk, the open source communications framework used by over one million systems [Read More]
EternalRocks is the first known malware incorporating seven NSA hacking tools to compromise systems and install a secret backdoor. [Read More]
Verizon Messages was affected by a flaw that could have been exploited to launch XSS attacks over SMS [Read More]

SecurityWeek Experts

rss icon

Marie Hattar's picture
Understanding how well (or not) websites and networks deal with the unexpected spikes in inbound traffic is the first step in dealing with DDoS attacks.
Danelle Au's picture
When a vendor comes in for a presentation and, after only a few minutes, claims to know precisely what your challenges are and how to solve them, that’s a major red flag for the confident CISO.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.
Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Steven Grossman's picture
President Trump's cybersecurity executive order touches on activities that indirectly but significantly impact government agencies’ cyber risk posture.
Barak Perelman's picture
It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.