Security Experts:

More Security Headlines

Dragos, a startup focused on protecting industrial control systems (ICS) from cyber threats, has raised $1.2 million from startup studio DataTribe. [Read More]
A critical vulnerability that can be exploited to bypass authentication affects servers, routers and gateways from Moxa [Read More]
A Linux Trojan (PNScan) that emerged more than a year ago is once again actively targeting routers in an attempt to install backdoors on them. [Read More]
A poorly conducted survey failed to provide enough information to come to any conclusion about the prevalence and effect of ransomware in UK universities. [Read More]
Wildfire, a recently observed piece of ransomware targeting mainly users in Belgium and the Netherlands, has generated roughly $80,000 in illicit revenue for its operators. [Read More]
Cyberattacks targeting the World Anti-Doping Agency (WADA) have been linked by experts to the Russian threat actor known as Fancy Bear, APT28 and Pawn Storm [Read More]
A gang of foreign criminals stole millions of baht by hacking a Thai bank's ATM network in a theft believed linked to a similar one in Taiwan, police said. [Read More]
Germany urged its population to stockpile food and water in case of terrorist or cyber attacks. [Read More]
The Cisco ASA exploit leaked by Shadow Brokers has been adapted to work on newer versions of the software [Read More]
Hackers with apparent ties to Russia have conducted a series of cyber attacks on US media outlets including the New York Times, CNN reported Tuesday. [Read More]

SecurityWeek Experts

rss icon

Alastair Paterson's picture
Developing awareness about dual revenue attacks is the first step in preparing your organization to deal with these threats.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Torsten George's picture
Relying solely on existing intelligence provided by vulnerability scanners should only be a first step in a cyber risk management process.
Ashley Arbuckle's picture
With good security hygiene and a few basic measures you’ll be able to more effectively block, contain, and negate the impact of ransomware.
Erin O’Malley's picture
To understand SIEM, it’s important to first understand when people started to care about network security. And to do that, we need to take a step back in time.
Jennifer Blatnik's picture
Listen to your coach. Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
Joshua Goldfarb's picture
Even the best security analysts need high quality, high fidelity base points/jumping off points from which to enter into productive, value-added work.
Nathaniel Gleicher's picture
Cybersecurity defenders face a similar problem to the Secret Service: they are defending high-value assets that must be protected, but also have to speak to hundreds or thousands of other servers.
Wade Williamson's picture
There are computers within our computers that are largely beyond the scope of security, yet control everything we think we know about the device.
Jim Ivers's picture
Organizations should fear security concerns when considering moving applications to the cloud. But they need to recognize that moving web applications to the cloud does not make them secure.