Security Experts:

More Security Headlines

Dell ships PCs with pre-installed self-signed root certificate that poses serious security and privacy risks
A piece of adware/malware dubbed Vonteera adds certificates from security firms to the “untrusted” list to disable anti-malware products
High-profile cyber-attacks will help drive growth in the oil and gas security and service market, which is estimated to grow from $26.3 billion in 2015 to $33.9 billion by 2020.
Man and woman suspected of operating and Cryptex Reborn malware services arrested by UK authorities.
Belgium announced that it will become a sponsoring nation for the NATO Cooperative Cyber Defence Centre of Excellence.
TrueCrypt is plagued by vulnerabilities, but the product is safer than initially reported, shows a recent audit commissioned by the German government.
Researcher says it took United Airlines nearly 6 months to patch a serious vulnerability exposing flight reservations.
Encryption can be a terrorist's tool. But it's also a key for those hunting attackers, and for many others.
Nmap Security Scanner 7.0.0 has been released. The latest version brings faster scans, a major NSE expansion and other significant improvements.
Starwood Hotels, which operates well-known hotel brands such as Westin, Sheraton, W Hotels and Le Méridien, said Friday that hackers had infected point of sale payment systems in some of its locations in North America.

SecurityWeek Experts

rss icon

Alastair Paterson's picture
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Marc Solomon's picture
The Internet of Everything is transforming our world and creating more opportunities for attackers as modern networks and their components constantly evolve and spawn new attack vectors.
Travis Greene's picture
The challenge in Information Security is recognizing how biases affect our judgment in evaluating and responding to threats and taking steps to mitigate them.
Danelle Au's picture
Attackers are thinking outside the box, using sophisticated breach methods and taking advantage of a very collaborative ecosystem. Perhaps it’s time to supplement all our security defenses with a hacker-centric security paradigm.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jay Schulman's picture
The ability to recruit the right person for an application security role who can also find the flaws is a struggle for many organizations. These job openings rarely get filled.
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Torsten George's picture
The DHS initiated the Continuous Diagnostics and Mitigation program to safeguard and secure Federal Information Technology networks. But can the DHS CDM program really strengthen the security posture of government networks?
Joshua Goldfarb's picture
Incident response is about taking action on those informed decisions. Once a threat is understood, it should be contained and remediated and security teams should respond quickly to minimize or eliminate damage to the organization.
Jason Polancich's picture
Companies that engage in periodic or annual cyber risk assessments and feel comfortable with results are flirting with disappointment - and maybe even disaster.