Security Experts:

More Security Headlines

The Department of Justice this week accused a total of 61 individuals and entities for their presumed involvement in a call center scam targeting tens of thousands of persons in the United States. [Read More]
A new zero-day distributed denial of service (DDoS) attack vector could open the flood gates for terabit-scale DDoS events, researchers at Corero Network Security warn. [Read More]
Apple patches a dozen vulnerabilities in Xcode and the Windows versions of iCloud and iTunes [Read More]
Ryan Collins sentenced to 18 months in prison for hacking over 100 iCloud and Gmail accounts, including many belonging to celebrities [Read More]
The Blackgear cyber espionage campaign, known to target users in Taiwan, has recently set sights on Japan [Read More]
Microsoft announced boosted customer security with a new feature in Office 2013: the ability to block risky macros right from the start. [Read More]
A threat group believed to be located in Palestine has been targeting users in the Middle East in cyber espionage campaigns [Read More]
Cisco has patched 9 vulnerabilities in its Email Security Appliances, including three high severity DoS issues [Read More]
Schneider Electric ConneXium industrial firewalls are affected by a critical vulnerability that can be exploited for remote code execution [Read More]
Industrial cybersecurity firm Nozomi Networks has raised $7.5 million in a Series A funding round, the company announced this week at SecurityWeek's 2016 ICS Cyber Security Conference, Atlanta. [Read More]

SecurityWeek Experts

rss icon

Adam Meyer's picture
Establishing a cyber threat intelligence capability is a strategic decision that takes patience and diligence, but which can change cybersecurity outcomes for the better over the long haul.
David Holmes's picture
Since Dyn is the major DNS provider for Twitter, Github, and Spotify, the knock-on effects of the massive DDoS attack have had a global reach.
Alastair Paterson's picture
This election cycle has shown that state actors may also believe that some data has more value if it is made public.
Joshua Goldfarb's picture
Security has evolved to the point that I can now say that collection, sensing, and alerting are yesterday’s news.
Rafal Los's picture
If you’re tired of changing your passwords using complex formulas you’ll never remember and have found yourself wondering just what your corporate security team is thinking, this post is for you.
Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.
Wade Williamson's picture
Instead of the “Department of No”, security teams need to be recognized as the even keel that stays the course even when the rest of the organization gets distracted.
Ashley Arbuckle's picture
What it takes to operate security operation center (SOC) effectively has changed in this ever-evolving threat landscape, putting an even greater burden on analysts and the technologies they rely upon.
Marie Hattar's picture
Marie Hattar of Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.