Security Experts:

More Security Headlines

The US website of the Metro newspaper (metro.us), which serves an estimated 1 million visitors every month, has been compromised and abused to distribute a malware via the RIG exploit kit.
Many software development firms still fail to ensure that the components they use don't contain security vulnerabilities, according to a report published by software supply chain management company Sonatype.
Non-profit organization Goodwill is investigating a possible data breach that might have impacted several of its stores across the United States.
Data security and cyber threat protection firm EdgeWave announced on Tuesday that it has closed a $6 million Series A funding round from TVC Capital.
New research from Palo Alto Networks shows that 419 scammers are evolving into attacking businesses.
Waterfall Security Solutions has teamed with energy management solutions maker Schneider Electric to offer Waterfall’s Unidirectional Security Gateways to Schneider’s customers.
LogRhythm has raised a $40 million round of new equity financing, the company announced.
A presentation on cracking the anonymity of the TOR network scheduled to be held at the upcoming Black Hat USA conference in Las Vegas has been cancelled.
Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference.
IBM is advising the owners of certain KVM switches to update the firmware on their devices to address a total of three security holes that can be exploited remotely.

SecurityWeek Experts

rss icon

Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.
Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Jason Polancich's picture
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.
Rebecca Lawson's picture
As enterprises made trade-offs in security; either sacrifice performance in order to add more layers of security beyond the traditional stateful firewall or don’t implement the new protections necessary to protect against many of the latest threats.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.