Security Experts:

More Security Headlines

Kaspersky Lab publishes report on the Java-based cross-platform backdoor known as JSocket, Adwind, AlienSpy and Frutas [Read More]
An update released by Advantech for its WebAccess SCADA/HMI product does not properly patch critical remote code execution vulnerabilities [Read More]
Kaspersky Lab researchers spotted several cybercrime groups that steal money directly from banks in APT-style attacks [Read More]
GitHub has rewarded researchers nearly $100,000 since the launch of its bug bounty program two years ago [Read More]
Bitcoin lending platform Loanbase informs customers of data breach. Hackers stole Bitcoin from several accounts [Read More]
Oracle has patched a high severity vulnerability in Java that can be exploited for arbitrary code execution [Read More]
OS X malware installs legitimate Flash Player and attempts to trick users into installing scareware [Read More]
The developers of the Neutrino exploit kit have added a passive OS fingerprinting feature to reduce exposure to analysis attempts [Read More]
In its 2015 Global Threat Report, security researchers at CrowdStrike examine the main trends in the threat landscape in 2015, including the evolution of Trojans, ransomware, phishing emails, and other threats. [Read More]
A group of former and current students have sued Google in federal court in San Jose, California, alleging that the company scanned their Gmail accounts and gathered data for advertising purposes. [Read More]

SecurityWeek Experts

rss icon

Jim Ivers's picture
Experienced organizations learn that security is not a drag on performance, but can provide productivity gains by eliminating security vulnerabilities early in the development process.
David Holmes's picture
During the public beta of Let’s Encrypt, it may simply be that people believe it will work. Belief works for medicine, but not for security. One way or the other, we’ll know soon.
Torsten George's picture
Threat intelligence has little value unless it is put into context of an organization’s security posture. Most enterprises don’t have the resources to apply the required logic to correlate external threat data with their internal security intelligence.
Alan Cohen's picture
Traditional incident management approaches that rely on network monitoring and detection of attacks are also falling short in today’s agile and distributed computing world.
Wade Williamson's picture
Asking for security backdoors that only benefit the good guys is like asking for bullets that only hurt the bad guys. That’s simply not how encryption works.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.
Joshua Goldfarb's picture
Every organization will have its limitations and resource constraints. But that doesn’t mean the organization should aim solely for "good enough" security.
Travis Greene's picture
The investment in access certifications have reduced the workload on IT, but by treating all entitlements and users the same, we’ve put the burden on LOB managers to manage the risk of excessive access.
Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.