Security Experts:

More Security Headlines

Google has decided to make some changes in its Chrome Web browser in order to ensure that users are protected against POODLE attacks.
Gottfrid Svartholm Warg, the Swedish co-founder of file-sharing website The Pirate Bay was found guilty in the largest hacking case in Denmark's history.
PCI Security Standards Council published advice for building a security awareness program.
Cybercriminals have developed a piece of software that's designed to help payment card fraudsters automate unauthorized charges to ensure that they make a profit before their activities are picked up by fraud detection systems.
The National Institute of Standards and Technology (NIST) is seeking public comment on a draft paper outlining ways to help organizations improve threat intelligence sharing.
The European Union Agency for Network and Information Security (ENISA) is organizing today the biggest and most complex European cybersecurity exercise to date.
A proof-of-concept malware developed by researchers at the Ben Gurion University in Israel shows that an attacker can transmit sensitive information from isolated computers to nearby mobile phones by using radio signals.
Merchant Customer Exchange (MCX), the developer of the mobile payment system called CurrentC, is notifying some users that their email addresses have been stolen by hackers.
Drupal is warning organizations to assume their Drupal 7 web sites were compromised unless updated or patched to version 7.32 before Oct 15th, 11pm UTC.
Microsoft will also disable SSL 3.0 support in Azure and Office 365 Dec. 1.

SecurityWeek Experts

rss icon

Jon-Louis Heimerl's picture
You can prioritize your needs when preparing yourself for zombies. When thinking in the world of information security we have the same way of prioritizing. Take the test to see if you are prepared! Tweet Your Score with the hashtag #ZombieSecTest
Marc Solomon's picture
Recent high-profile security breaches at major retailers stem from the fact that in-store networks and their components are evolving and spawning a range of attack vectors.
Joshua Goldfarb's picture
When looking to measure the success and progress of a security program, it is important to think about what success and progress actually mean.
Danelle Au's picture
Cloud adoption should be a collaborative rather than prescriptive process between employees and IT. With the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.
Jason Polancich's picture
Your employees, partners, customers and suppliers are your “survival group” battle-buddies now and it’s important to know how the zombies behave and where they hide.
Travis Greene's picture
IAM is sometimes forgotten in the discussion of controls. However, it’s best to have these conversations when planning and evaluating controls, rather than after a breach.
James McFarlin's picture
A bountiful source of innovative new products for mature security providers lies in the hunting ground of promising newer firms.
Adam Firestone's picture
The imposition of externally-defined cybersecurity methodologies and solutions on both government and critical infrastructure programs hasn’t proven effective. Fortunately, the political and technical winds are shifting
Torsten George's picture
To limit the risk of having drive-by malware attacks planted on their websites, organizations should monitor the payload of their different Internet properties, which for larger organizations can easily become a huge undertaking.
Joshua Goldfarb's picture
As information security professionals, it is tempting to become enamored with the beauty or elegance of a technical solution, analytical technique, or investigative outcome.