Security Experts:

More Security Headlines

Rep. Tom Graves (R-Ga.) has released an updated version (PDF) of his draft Active Cyber Defense Certainty (ACDC) Act. [Read More]
Summary and roundup of this new products, surveys and cybersecurity industry comments on the upcoming General Data Protection Regulation (GDPR). [Read More]
A recent distribution campaign resulted in thousands of machines being infected with the Qbot malware, Cylance security researchers warn. [Read More]
Three Nigerians sentenced to 115, 95 and 25 years in prison for their role in a massive international fraud scheme [Read More]
Researchers analyzed pacemakers from four major vendors and found that the third-party libraries they use have over 8,000 known vulnerabilities [Read More]
Russia's campaign of cyberespionage and disinformation has targeted hundreds of individuals and organizations from at least 39 countries along with the United Nations and NATO, researchers said Thursday. [Read More]
One of the vulnerabilities addressed by Google in its May 2017 security patches allowed the bypass of Nexus 6’s Secure Boot through kernel command-line injection, HCL Technologies researchers reveal. [Read More]
Linguistic analysis of WannaCry ransom notes suggests that the ransomware authors are fluent in Chinese and familiar with English [Read More]
Endpoint security and systems management firm Tanium has raised another $100 million, bringing the total investment to $407 million [Read More]
While there is a general lack of preparedness for GDPR among most organizations, specific concerns and expectations can vary widely between the different nations. [Read More]

SecurityWeek Experts

rss icon

Adam Meyer's picture
Business executives can benefit from strategic threat intelligence by gaining critical insights and establishing meaningful cybersecurity benchmarks.
Justin Fier's picture
The early indicators of the WannaCry attack were evident, but it spread too quickly for human security teams to react before it spread across the world like wildfire.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Alastair Paterson's picture
With elections coming up in the UK in June and Germany in September what type of cyber interference might we expect? And, more importantly, what steps can we take to mitigate risk?
Galina Antova's picture
The security risk to Industrial Control Systems (ICS) networks is systemic and not determined by vulnerabilities alone.
Preston Hogue's picture
Defenders need a new type of counterinsurgent security that can move out into the jungle to protect users and sensitive data against attackers who disguise their exploits with the very encryption that we think keeps us safe.
Marie Hattar's picture
Understanding how well (or not) websites and networks deal with the unexpected spikes in inbound traffic is the first step in dealing with DDoS attacks.
Danelle Au's picture
When a vendor comes in for a presentation and, after only a few minutes, claims to know precisely what your challenges are and how to solve them, that’s a major red flag for the confident CISO.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.
Ashley Arbuckle's picture
In a globally interconnected world, knowledge-based economies are shaping our future, and vendor relationships are critical to success.