Security Experts:

More Security Headlines

PowerShell, the scripting language and shell framework that is installed by default on most Windows computers, is becoming a favored attack tool for malware infections. [Read More]
Malwarebytes 3.0 endpoint security combines the market preference for a single all-in-one product with the security expert's preference for layered security. [Read More]
The Georgia Institute of Technology has been awarded a $17.3 million contract to develop a scientific method for cyber attack attribution. But Is accurate cyber attack attribution possible? [Read More]
German heavy industry giant ThyssenKrupp said it fell victim to a hacking attack in which the perpetrators sought to steal company secrets. [Read More]
A new information stealing piece of malware called "August" is using Word documents containing malicious macros and is abusing PowerShell for a fileless infection, Proofpoint security researchers warn. [Read More]
Institutionalizing cybersecurity, reducing complexity, active defenses and transformative research are key to reducing cyber risk at nuclear facilities [Read More]
Private Internet Access has contracted cryptography expert Matthew Green to conduct a comprehensive audit of OpenVPN [Read More]
Some malware families targeting Point-of-Sale (POS) systems did not take a vacation this Thanksgiving, but instead were hard at work, Proofpoint security researchers say. [Read More]
An variant of the Petya ransomware has emerged recently, which has been renamed to Goldeneye, but displays almost no changes when compared to the original, security researchers warn. [Read More]
Brazilian developer of the Floki Bot banking Trojan interacts with English and Russian-speaking communities to import knowledge and tools [Read More]

SecurityWeek Experts

rss icon

Adam Meyer's picture
At the end of the day, whatever your cyber threat intelligence plan and process is, it should drive faster and smarter decisions that minimize your risk exposure.
Alastair Paterson's picture
By being aware of the latest tactics, techniques and procedures (TTPs), organizations can understand how to mitigate damage and thwart cyber attacks during the holidays.
David Holmes's picture
Many can figure out how to hack Smart-city services using simple techniques like replay to get free services or, in some cases, make a little bit of money.
Lance Cottrell's picture
By focusing on key attack surfaces and architecting systems to maximize the effectiveness of our monitoring efforts we can detect and stop intrusions much more quickly.
Rafal Los's picture
Security frameworks are designed to provide a reference for those designing various programmatic security mechanisms in order to benefit from collective successes and failures of the broad community.
Josh Lefkowitz's picture
Entering the Deep & Dark Web also requires highly-advanced operations security and technical skills. Not only is gaining access to these online communities extremely difficult, it is risky.
Ashley Arbuckle's picture
There’s a lot organizations can do to strengthen their incident response capabilities so that they’re up to the test. Here are a few ways to take charge and ensure a better outcome...
Joshua Goldfarb's picture
Defenders must think more broadly about the risk they're trying to mitigate, rather than getting distracted and instituting one-off policies and solutions to new means that may arise.
Torsten George's picture
Faced with hundreds, thousands, and even hundreds of thousands of vulnerabilities across their IT infrastructures leaves security practitioners at a virtually insurmountable disadvantage.
Steven Grossman's picture
The PCI DSS 3.2 should greatly help companies reduce third party vendor risk, and is starting to shift from just a check-the-compliance-box activity to a more continuous compliance model.